PAN-OS 10.2.13-h7 Addressed Issues
Focus
Focus

PAN-OS 10.2.13-h7 Addressed Issues

Table of Contents

PAN-OS 10.2.13-h7 Addressed Issues

Addressed issues for the PAN-OS 10.2.13-h7 general available hotfix release.
Issue IDDescription
PAN-286255
Fixed an issue where, when the firewall received an unexpected termination request for SSL sessions, the dataplane experienced a slow buffer resource leak.
PAN-283813
Fixed an issue on Panorama where the web interface performance was slower than usual when retrieving read-only configurations from Panorama.
PAN-282394
Fixed an issue where a firewall was only able to display a maximum of 14 permitted IP addresses from a Panorama Template Variable.
PAN-282236
Fixed an issue where large IPv6 packets were reassembled incorrectly on the firewall when the packets arrived fragmented over an IPv4 tunnel.
PAN-279621
Fixed an issue where processes stopped responding when HTTPS Forward traffic was run.
PAN-279400
Fixed an issue where, when Restrict Certificate Extensions was enabled on decryption profiles, the basic constraints extension was overwritten incorrectly.
PAN-278150
Fixed an issue where the firewall removed the Authentication Key Identifier (AKID) from the certificate during SSL decryption, which caused Python 3.13 to fail with a certificate verification error.
PAN-277417
Fixed an memory leak issue related to TLS inbound decryption.
PAN-277234
Fixed an issue where a device group import resulted in a Security policy rule being created with Application set to none.
PAN-277147
Fixed an issue where daily scheduled reports were not generated and emailed.
PAN-276678
Fixed an issue where Panorama became unresponsive while performing a dynamic address update without a lock.
PAN-275077
Fixed an issue where DNS Security intermittently logs malicious domain URLs as Alert instead of taking a Sinkhole action, even when configured to Sinkhole malicious DNS domains.
PAN-274797
Fixed an issue where a DPC on slot 3 failed intermittently due to the pktlog_forwarding process restarting, which resulted in an unexpected HA failover.
PAN-274726
Fixed an issue where Wildfire signature generation was enabled on all nodes in a cluster instead of only the active node.
PAN-273964
Fixed an issue where SNMP scans to a firewall timed out after upgrading to a PAN-OS 10.2 release.
PAN-273453
Fixed an issue where restarting the firewall did not initiate an autocommit job, which caused the firewall to stop responding and the HA interface to go down.
PAN-273141
Fixed an issue where GlobalProtect clients experienced slow file transfer download throughput when passing through an IPSec tunnel.
PAN-272959
Fixed an issue where the firewall generated BGP update packets larger than 1500 bytes when the interface MTU was 1500 bytes and jumbo frames were enabled globally.
PAN-272395
Fixed an issue where informational logs caused the distributord process log file to be frequently overwritten.
PAN-272175
Fixed an issue where session rematch caused ACE cloud application traffic to match the wrong policy.
PAN-271425
(Firewalls in active/active HA configurations only) Fixed an issue with SSL inbound decryption on firewalls on a vwire setup with asymmetric routing.
To use this fix, enter the CLI command set system setting ssl-decrypt ha-vwire-mac-learn global yes on both firewalls in an HA pair.
PAN-271184
Fixed an issue where Device Telemetry failed due to an issue with the encoding of characters in the log file path.
PAN-269956
Fixed an issue where the all_pktproc process stopped responding, which caused internal path monitor failures.
PAN-269677
Fixed an issue where Panorama did not check for a NULL pointer when querying logs, which caused logs to not display on the web interface.
PAN-269291
Fixed an issue where the scheduled report generation script did not return debug information.
PAN-269106
Fixed an issue where the wifclient stopped responding during server certificate verification for MICA gRPC connections and caused the dataplane to restart when using a cloud-based ML detection engine (MICA). On certain platforms, this caused the firewall to reboot periodically.
PAN-269052
Fixed an issue where traffic was blocked by a URL filtering profile even though the Security policy rule did not have a URL filtering profile configured.
PAN-269027
Fixed an issue related to external dynamic lists that caused commit times on the firewall to be higher than expected.
PAN-268951
Fixed a CPS counter query issue that caused SNMP polling timeouts on the firewall.
PAN-268118
Fixed an issue on firewalls in active/passive HA configurations where, after a failover, irrelevant routing FIB entries were seen in the routing table on the newly active firewall.
PAN-267707
Fixed an issue where BFD sessions did not come up even when BGP peering was established.
PAN-267097
Fixed an issue where the replay database size increased significantly due to local and special configurations not being purged after commits.
PAN-266900
Fixed an issue on the Panorama web interface where you were unable to click OK after selecting an install package type and file from the dropdown and selecting a firewall.
PAN-265791
Fixed an issue where the all_task process stopped responding, which caused the dataplane to go down.
PAN-265646
Fixed an issue where the config lock icon was not visible for a custom role-based admin when a Superuser admin had acquired the config lock.
PAN-264708
Fixed an issue where a selective push was blocked when a configuration load was done.
PAN-264678
Fixed an issue where Preview Changes did not display configuration changes in Commit and push > Push Scope.
PAN-264169
(PA-5400 Series firewalls only) Fixed an issue where the firewall sent correlated event logs to the syslog server using the management interface instead of the log interface.
PAN-263654
Fixed an issue where multiple DNS responses with different CNAME values caused evasion false positive alerts.
PAN-263559
Fixed an issue where the dataplane stopped responding and the firewall unexpectedly rebooted due to multiple process restarts.
PAN-262729
(Panorama appliances only) Fixed an issue where the configd process experienced continuous high CPU utilization and repeatedly restarted.
PAN-262540
Fixed an issue where application traffic transactions that reused TCP ports did not work with decryption.
PAN-262383
Fixed an issue where the firewall was unable to decompress the HTTP2 header, which caused the session to be classified as unknown-tcp instead of web-browsing.
PAN-260300
(PA-5410, PA-5420, PA-5430, PA-5440 and PA-5445 firewalls only) Fixed an issue related to the all_pktproc process where DPC slot 3 stopped responding.
PAN-260131
Fixed an issue where Wildfire content installation failed for WF-500B clusters when deployed from Panorama using the deployment schedule.
PAN-260015
Fixed an issue on the firewall where the dataplane restarted due to insufficient allocation of memory buffers.
PAN-254577
Fixed an issue where a core file was created on the Log Forwarding Card due to a third-party software issue.
PAN-249581
Fixed an issue where stale BGP routes were advertised to peers even when they were not present in the local RIB table.
PAN-249011
Fixed an issue where the firewall became unresponsive when committing a configuration change with a large number of uncommitted changes in the replay database.
PAN-241772
Fixed an issue where, when TLSv1.3 was used, an incorrect error message invalid padding was displayed instead of the expected error message Invalid server certificate.
PAN-241126
Fixed an issue where the client IP address was incorrect in the authentication logs for Captive Portal authentication events when the client used IPv6.
PAN-238594
Fixed an issue where the firewall rebooted when a QSFP28 cable was removed from the port while the port was passing traffic.
PAN-237010
Fixed an issue on Panorama where local commits took longer than expected after an upgrade.
PAN-233868
Fixed an issue where the firewall took an incorrect action for overlapping custom and edl-url-categories in a policy rule.
PAN-233581
Fixed an issue on firewalls in active/active HA configurations where SYN+ACK packets of asymmetric TCP sessions were dropped because of a session synchronization issue.
PAN-224833
Fixed an issue where the firewall dropped DHCPv6 relay packets if there were duplicate link-local addresses on different sub-interfaces.
PAN-212735
Fixed an issue where sessions that were previously in sw-cut-through mode (software fast forwarding) and persisted after an HA failover were no longer subject to software fast forwarding, which led to increased dataplane CPU load after HA failover.