Palo Alto Networks Firewall Reboot Loop Flaw Affects Next-Generation Devices

Related

ApolloMD Data Breach Impacts More Than 620,000

What happened A cyberattack on the Georgia-based healthcare provider ApolloMD...

Atlas Air Ransomware Breach Allegedly Exposes Boeing Technical Data

What happened Attackers claiming affiliation with the Everest ransomware gang...

Threat Actors Leveraging Employee Monitoring and SimpleHelp Tools in Attacks

What happened Security researchers have documented threat actors abusing legitimate...

Palo Alto Networks Firewall Reboot Loop Flaw Affects Next-Generation Devices

What happened A software flaw in Palo Alto Networks next-generation...

Promptware Leveraged Google Calendar Invites in Credential Harvesting Campaign

What happened Security researchers from ReversingLabs have uncovered a malicious...

Share

What happened

A software flaw in Palo Alto Networks next-generation firewalls has been disclosed that can cause devices to enter a continuous reboot loop after processing certain crafted network traffic. According to the report, the issue resides in how specific packet sequences are handled by the firewall’s processing engine, which under particular conditions triggers a system failure that forces the appliance to restart repeatedly. The problem affects multiple models in the Palo Alto Networks next-generation firewall line running particular PAN-OS versions, and administrators reported seeing operational disruptions when the flaw was triggered during normal traffic flows. Palo Alto Networks acknowledged the issue and released updated software builds that correct the packet-handling logic to prevent the reboot behavior from occurring.

Who is affected

Organisations operating affected Palo Alto Networks next-generation firewall models with vulnerable PAN-OS versions are affected, as the flaw can be triggered by network traffic patterns that cause the devices to continuously reboot, impacting security enforcement and connectivity.

Why CISOs should care

A defect in firewall packet processing that results in device reboot loops can undermine perimeter defenses, disrupt network availability, and complicate incident response if core security appliances lose operational stability under real-world traffic.

3 practical actions

Update firewall software. Apply the patched PAN-OS releases that address the packet-handling flaw causing reboot loops.

Validate traffic behavior. Review network traffic patterns for any triggers that may have previously caused instability.

Monitor appliance health. Use logs and telemetry to detect unexpected restarts or operational disruptions on firewall systems.