Prisma Access Update Plan for CVE-2024-3400 (FedRAMP Moderate & FedRAMP High)
Scheduled Maintenance Report for Prisma Access
Completed
The scheduled maintenance has been completed.
Posted Apr 20, 2024 - 03:00 UTC
In progress
Scheduled maintenance is currently in progress. We will provide updates as necessary.
Posted Apr 19, 2024 - 03:00 UTC
Scheduled
This is an update notice related to the Palo Alto Networks Security Advisory that was sent on April 11, 2024, regarding the OS Command Injection Vulnerability in GlobalProtect (CVE-2024-3400).

As a precautionary step and to further strengthen our infrastructure against such attacks, Prisma Access has applied latest threat signatures to the security processing nodes. Palo Alto Networks will be proactively applying a fix to your Prisma Access GlobalProtect portals and gateways. This is an emergency unscheduled upgrade and will not follow the normal dataplane upgrade process. The upgrade will be performed for all deployments using the following schedule per theater:

JAPAC – April 19, 2024 between 12:30 and 20:30 UTC
EMEA – April 19, 2024 between 18:00 and 02:00 UTC
Americas – April 19, 2024 between 03:00 and 11:00 UTC

Our goal is to minimize impact to network traffic, but there will be a brief interruption during the upgrade window.

Please ensure that the latest set of public IP addresses used by Prisma Access are allow listed across SaaS vendors and other required service providers. You will not have any additional IP addresses assigned to you as a result of this upgrade.
Posted Apr 17, 2024 - 21:51 UTC
This scheduled maintenance affected: Prisma Access FedRAMP (MU/RN/SC/SWG) - APAC (Australia Southeast, India West, Japan Central, Japan South, Singapore, Taiwan), Prisma Access FedRAMP (MU/RN/SC/SWG) - AMER (Brazil South, Canada East, US Central, US East, US Gov East, US Gov West, US Northwest, US South, US Southeast, US Southwest), and Prisma Access FedRAMP (MU/RN/SC/SWG) - EMEA (Belgium, Finland, Germany Central, Netherlands Central, Switzerland, UK).