Affected products include those running PAN-OS firewall software, including PA-Series, VM-Series, and CN-Series devices. PAN-OS versions vulnerable to attack, with patches available, include versions prior to 10.2.2-h2, 10.1.6-h6, 10.0.11-h1, 9.1.14-h4, 9.0.16-h3, and 8.1.23-h1. The vulnerability lies in specific URL filtering configurations, where a misconfiguration can allow for reflected and amplified TCP denial-of-service attacks.
According to the Palo Alto Networks advisory, the firewall configuration must have a URL filtering profile with one or more blocked categories assigned to a security rule with a source zone that has an external-facing network interface. This configuration, often unintended by the network administrator, is the entry point for the attacks.