Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Palo Alto Fixes GlobalProtect DoS Flaw That Can Crash Firewalls Without Login

Posted on January 15, 2026January 15, 2026 By CWS

Jan 15, 2026Ravie LakshmananNetwork Safety / Vulnerability
Palo Alto Networks has launched safety updates for a high-severity safety flaw impacting GlobalProtect Gateway and Portal, for which it stated there exists a proof-of-concept (PoC) exploit.
The vulnerability, tracked as CVE-2026-0227 (CVSS rating: 7.7), has been described as a denial-of-service (DoS) situation impacting GlobalProtect PAN-OS software program arising because of an improper verify for distinctive situations (CWE-754)
“A vulnerability in Palo Alto Networks PAN-OS software program allows an unauthenticated attacker to trigger a denial-of-service (DoS) to the firewall,” the corporate stated in an advisory launched Wednesday. “Repeated makes an attempt to set off this concern end result within the firewall coming into into upkeep mode.”
The difficulty, found and reported by an unnamed exterior researcher, impacts the next variations –

PAN-OS 12.1 < 12.1.3-h3, < 12.1.4
PAN-OS 11.2 < 11.2.4-h15, < 11.2.7-h8, < 11.2.10-h2
PAN-OS 11.1 < 11.1.4-h27, < 11.1.6-h23, < 11.1.10-h9, < 11.1.13
PAN-OS 10.2 < 10.2.7-h32, < 10.2.10-h30, < 10.2.13-h18, < 10.2.16-h6, < 10.2.18-h1
PAN-OS 10.1 < 10.1.14-h20
Prisma Entry 11.2 < 11.2.7-h8
Prisma Entry 10.2 < 10.2.10-h29

Palo Alto Networks additionally clarified that the vulnerability is relevant solely to PAN-OS NGFW or Prisma Entry configurations with an enabled GlobalProtect gateway or portal. The corporate’s Cloud Subsequent-Era Firewall (NGFW) just isn’t impacted. There aren’t any workarounds to mitigate the flaw.
Whereas there isn’t any proof that the vulnerability has been exploited within the wild, it is important to maintain the units up-to-date, particularly provided that uncovered GlobalProtect gateways have witnessed repeated scanning exercise over the previous yr.

The Hacker News Tags:Alto, Crash, DoS, Firewalls, Fixes, Flaw, GlobalProtect, Login, Palo

Post navigation

Previous Post: Chinese Threat Actors Hosted 18,000 Active C2 Servers Across 48 Hosting Providers
Next Post: ICS Patch Tuesday: Vulnerabilities Fixed by Siemens, Schneider, Aveva, Phoenix Contact

Related Posts

Chinese Group Silver Fox Uses Fake Websites to Deliver Sainbox RAT and Hidden Rootkit The Hacker News
ServiceNow Flaw CVE-2025-3648 Could Lead to Data Exposure via Misconfigured ACLs The Hacker News
GhostRedirector Hacks 65 Windows Servers Using Rungan Backdoor and Gamshen IIS Module The Hacker News
EvilAI Malware Masquerades as AI Tools to Infiltrate Global Organizations The Hacker News
CISA Orders Urgent Patching After Chinese Hackers Exploit SharePoint Flaws in Live Attacks The Hacker News
Silver Fox Uses Fake Microsoft Teams Installer to Spread ValleyRAT Malware in China The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data
  • Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
  • Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine
  • 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
  • Central Maine Healthcare Data Breach Impacts 145,000 Individuals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • New ‘Reprompt’ Attack Silently Siphons Microsoft Copilot Data
  • Model Security Is the Wrong Frame – The Real Risk Is Workflow Security
  • Microsoft and Authorities Dismatles BEC Attack Chain Powered by RedVDS Fraud Engine
  • 4 Outdated Habits Destroying Your SOC’s MTTR in 2026
  • Central Maine Healthcare Data Breach Impacts 145,000 Individuals

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark