
OPERATIONAL DEFECT DATABASE
...


...

The earliest recollection of this bug is traced back to PAN-OS 11.1.6-h22 - October 30, 2025. This bug is fixed in PAN-OS versions 11.1.6-h22. Fixed an issue where the TLS handshake did not complete and the session did not go through. This occurred if the HTTP header insertion applied to an HTTP CONNECT request passing through the firewall, the scan-handshake feature was enabled, the session matched a decryption policy rule with the decrypt action, and if the TLS client hello was in a single packet and TLS 1.2 or below. For more information: https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-6-known-and-addressed-issues/pan-os-11-1-6-h22-addressed-issues
Click on a version to see all relevant bugs
Palo Alto Networks Integration
Learn more about where this data comes from
Bug Scrub Advisor
Streamline upgrades with automated vendor bug scrubs
BugZero Enterprise
Wish you caught this bug sooner? Get proactive today.