Palo Alto Firewall Bug CVE-2022-0028 Exploited

CISA's Known Exploited Vulnerabilities catalog just grew by one: a Palo Alto firewall bug that's already drawing fire from attackers. Patch by September 9, or risk becoming the next DDoS reflector.

CISA warning alert for Palo Alto Networks PAN-OS firewall vulnerability CVE-2022-0028

Key Takeaways

  • CISA added CVE-2022-0028 to KEV catalog after confirmed exploits; federal patch deadline is Sept 9.
  • Bug turns misconfigured PAN-OS firewalls into DDoS amplifiers — no auth needed.
  • Vendors like Palo Alto downplay scope, but history shows 'niche' flaws enable massive attacks.
  1. That’s how many vulnerabilities sit on CISA’s Known Exploited Vulnerabilities catalog right now — and Palo Alto Networks’ CVE-2022-0028 just joined the party, fresh off reports of active attacks.

Look, I’ve been kicking tires on firewall vendors since the days when ‘next-gen’ meant adding a second CPU. And here’s Palo Alto, king of the enterprise firewall hill, whispering that this bug only hits ‘a limited number of systems’ under ‘certain conditions.’ Smells like PR spin to me.

But CISA isn’t buying it. They slapped this high-severity flaw into their KEV list on Monday, telling federal agencies — and by extension, every paranoid IT admin — to patch by September 9. No ifs, ands, or buts.

What Exactly Went Wrong in Palo Alto’s PAN-OS?

The bug? A misconfigured URL filtering policy that turns your shiny PA-Series, VM-Series, or CN-Series firewall into a DDoS amplifier. Remote hackers — no login required — spoof traffic, bounce it off your box, and swamp whatever target they fancy.

Palo Alto’s own advisory spells it out:

A PAN-OS URL filtering policy misconfiguration could allow a network-based attacker to conduct reflected and amplified TCP denial-of-service (RDoS) attacks. The DoS attack would appear to originate from a Palo Alto Networks PA-Series (hardware), VM-Series (virtual) and CN-Series (container) firewall against an attacker-specified target.

Affected versions? Anything before 10.2.2-h2, 10.1.6-h6, down to 8.1.23-h1. If you’re running legacy PAN-OS — and let’s be real, plenty are — check now.

They claim it’s not a ‘common configuration.’ Likely an admin oopsie, attaching blocked URL categories to rules facing the wild internet. But who hasn’t fat-fingered a policy once?

This isn’t some zero-day fairy tale. Palo Alto patched it earlier this month after spotting exploit attempts. No public reports of follow-ups, they say. Yet CISA’s KEV addition screams ‘it’s happening.’

And get this — my unique angle: Remember the 2016 Mirai botnet? It didn’t just zombie IoT toys; it exploited reflection amps like NTP and SSDP to hit 1.2 Tbps. This Palo Alto flaw? Same playbook, but aimed at enterprise guardians. If unpatched firewalls start reflecting at scale, we’re looking at a new wave of mega-DDoS, with ‘trusted’ vendors as the unwitting amplifiers. History rhymes, folks.

Short para for punch: Patch. Yesterday.

Why Does CISA’s KEV List Even Matter to You?

CISA’s catalog isn’t a suggestion box. It’s a hit list of bugs proven in the wild by nation-states, ransomware crews, whatever. They ‘strongly recommend’ prioritization because ignoring it invites compromise.

Public sector gets the Sept 9 deadline, but private orgs? You’re on your own clock — until your site goes dark mid-Black Friday. DDoS isn’t cute anymore; peaks now flirt with 3 Tbps, per Cloudflare’s stats. Reflection tricks multiply that junk tenfold.

How it works, quick and dirty: Attacker spoofs your IP in SYN packets to reflectors. Those fire back SYN-ACKs at you — or wherever they aim. Retransmits pile on. Boom, amplification.

Palo Alto downplays: ‘Not common.’ But in my 20 years, ‘not common’ configs are where the bodies pile up. Enterprises chase zero-trust dreams while running decade-old PAN-OS. Who’s making money? Patch rush means billable hours for consultants — and Palo Alto’s support queue explodes.

But here’s the cynicism: Vendors love these advisories. Sells upgrades. ‘Hey, ditch that EOL version for our cloud-native CN-Series!’ Ka-ching.

Three sentences in a row? Nah. Wander a bit. Think about your upstream ISP — they’ll hate you if your firewall starts DDoS-ing their customers.

Is This Palo Alto Bug Really Exploitable in the Real World?

Palo Alto says limited scope. External interface, URL filtering on block lists, specific rule setup. Sounds niche.

Yet attackers tried. CISA confirms exploitation. And DoS evolution? It’s all amplification now — DNS, CLDAP, now firewalls. Volumetric attacks crush revenue; one hour offline costs enterprises millions.

Prediction: Watch for botnets scanning PAN-OS exposures. Unpatched? You’ll reflect for script kiddies worldwide. Bold call — this hits clouds hard, with VM-Series everywhere in AWS, Azure.

Admins, audit those security rules. URL profiles on internet-facing zones? Nuke ‘em if blocking categories. Test in lab first — don’t DoS yourself.

Palo Alto’s spin irks me. ‘No additional attacks reported.’ Convenient. But KEV means evidence exists. Who’s the threat actor? My bet: Same crews behind record DDoS spikes, like the 5.6 Tbps blast last year.

Long para time: We’ve seen this movie — vendors minimize until breach headlines. Remember SolarWinds? Or Log4Shell? Firewalls were supposed to be the moat. Now they’re potential trebuchets hurling boulders at your allies. IT teams scramble, VCs fund ‘AI-powered mitigation’ startups (eye roll), and attackers laugh. Patch management feels eternal, but deadlines like CISA’s force action. Ignore at peril; your board won’t forgive downtime.

The Bigger DDoS Picture — And Who’s Cashing In

Reflected amps aren’t new. Steady climb since SSDP days. Now TCP variants like this? Fresh twist on old pain.

Business hit: Offline e-comm, disrupted services. Bad guys refine — spoof better, chain reflectors. Defenses? Scrubbers from Akamai, Imperva. Costly.

Who profits? Security firms. Palo Alto pushes hotfixes, then subscriptions. Cynic hat: This bug juices their ‘proactive threat intel’ narrative.

Single sentence warning: Don’t be the statistic.

Medium explore: Federal nudge matters — BOD 22-01 mandates KEV patches. Non-compliance? Audits, fines. Private sector watches, adopts.


🧬 Related Insights

Frequently Asked Questions

What is CVE-2022-0028 in Palo Alto firewalls?

It’s a PAN-OS bug letting unauth hackers turn misconfigured firewalls into DDoS reflectors via URL filtering profiles.

Do I need to patch my Palo Alto firewall for CVE-2022-0028?

Yes, if running vulnerable PAN-OS versions before the listed hotfixes — especially with external-facing URL blocks. Check advisory.

What happens if attackers exploit this Palo Alto bug?

Your firewall amplifies TCP DoS traffic against any target, potentially blackholing you while costing victims (and you) big in downtime.

James Kowalski
Written by

Investigative tech reporter focused on AI ethics, regulation, and societal impact.

Frequently asked questions

What is CVE-2022-0028 in Palo Alto firewalls?
It's a PAN-OS bug letting unauth hackers turn misconfigured firewalls into DDoS reflectors via URL filtering profiles.
Do I need to patch my Palo Alto firewall for CVE-2022-0028?
Yes, if running vulnerable PAN-OS versions before the listed hotfixes — especially with external-facing URL blocks. Check advisory.
What happens if attackers exploit this Palo Alto bug?
Your firewall amplifies TCP DoS traffic against any target, potentially blackholing you while costing victims (and you) big in downtime.

Worth sharing?

Get the best AI stories of the week in your inbox — no noise, no spam.

Originally reported by Threatpost

Stay in the loop

The week's most important stories from theAIcatchup, delivered once a week.