On-Prem

Networks

Mysterious Palo Alto firewall reboots? You're not alone

Limited-edition hotfix to get wider release before end of month


Administrators of Palo Alto Networks' firewalls have complained the equipment falls over unexpectedly, and while a fix has bee prepared, it's not yet generally available.

Multiple customers have reported that some hardware running version 11.1.4-h7/h9 of PAN-OS, the software that powers Palo Alto’s firewalls, reboot at random moments.

"We have had three of our eight firewalls unexpectedly reboot in the past few months," observed one netizen.

We know having firewalls mysteriously spontaneously reboot is not ideal. These strange failures can be interpreted as something more malicious going on, such as some security bug exploitation or an intrusion, or something as frustrating as an intermittent hardware fault. A glitching firewall can therefore be taken as a sign of something serious and such false alarms are not what overworked and stressed defenders need.

Thankfully there's a fix. Palo Alto told The Register a patch is available albeit as a limited release at the moment, and that the restarts are caused by specific network traffic.

"The hotfix 11.1.4-h12, which resolves the unexpected reboot issue, was initially shipped with limited availability on January 31. This version was made available to customers requiring immediate resolution, accessible through their account team," a spokesperson told us.

"We are currently validating an additional unrelated regression fix in hotfix 11.1.4-h13. Our goal is to release this as a generally available (GA) update by February 20 or sooner. This will ensure all systems are fully optimized and secure with the latest updates."

Palo Alto declined to detail the traffic conditions that can cause its firewalls to reboot, citing security grounds, or the specifics of the fault itself.

Proofpoint wobbles... FYI, on Monday, Proofpoint's anti-spam service began rejecting legitimate emails, or blocking them altogether, according to users and one reseller.

"Proofpoint experienced a software issue that temporarily impacted the delivery of emails containing URLs," the vendor told The Register.

"A corrupted detection rule misclassified certain URLs, leading to quarantined messages. The issue was quickly identified and resolved. No messages were lost, and all systems are currently processing new emails normally. This was not a cyberattack, and emails without URLs were unaffected."

We reckon the restarts will be making some nervous because, as one of the big dogs in the firewall field, Palo Alto’s products are a target for criminals. Last November thousands of its firewalls were hijacked after a couple of serious flaws that required no privileges nor user interaction to exploit were found and subsequently abused. Attackers swooped and firewalls started crypto-mining within 24 hours of a fix being released.

Earlier in 2024 the Iranian state-sponsored Pioneer Kitten crew took aim at Palo Alto products - along with many others - leading to a joint warning from the FBI, CISA, and the Department of Defense Cyber Crime Center in the US. In April of the same year, the manufacturer patched a CVSS 10-out-of-10 command-injection flaw in its firewalls. ®

Send us news
6 Comments

Palo Alto firewalls under attack as miscreants chain flaws for root access

If you want to avoid urgent patches, stop exposing management consoles to the public internet

Zyxel firewalls borked by buggy update, on-site access required for fix

Boxes stuck in boot loops and various other malfunctions

Fortinet: FortiGate config leaks are genuine but misleading

Competition hots up with Ivanti over who can have the worst start to a year

Miscreants 'mass exploited' Fortinet firewalls, 'highly probable' zero-day used

Ransomware 'not off the table,' Arctic Wolf threat hunter tells El Reg

Palo Alto Networks tackles firewall-busting zero-days with critical patches

Amazing that these two bugs got into a production appliance, say researchers

Mystery Palo Alto Networks hijack-my-firewall zero-day now officially under exploit

Yank access to management interface, stat

Don't fall for a mail asking for rapid Docusign action – it may be an Azure account hijack phish

Recent campaign targeted 20,000 folk across UK and Europe with this tactic, Unit 42 warns

US names Chinese national it alleges was behind 2020 attack on Sophos firewalls

Also sanctions his employer – an outfit called Sichuan Silence linked to Ragnarok ransomware

1,000s of Palo Alto Networks firewalls hijacked as miscreants exploit critical hole

PAN-PAN! Intruders inject web shell backdoors, crypto-coin miners, more

Proofpoint phishing palaver plagues millions with 'perfectly spoofed' emails from IBM, Nike, Disney, others

They DKIM here, they DKIM there

Move over, Cobalt Strike. Splinter’s the new post-exploit menace in town

No malware crew linked to this latest red-teaming tool yet

Pakistan’s internet slows to uncomfortable levels, allegedly due to new China-style firewall

Minister issues denial – it's just an upgrade to the 'web-management system'