Join us in Orlando, October 14-16, for the VISIONS CIO Summit, hosted by Quartz Network. Be our guest when you use code NWG-VIP.
As part of UpKeep, our new feature to keep our NWG Manage customers' devices on the latest stable version, we reviewed the latest Palo Alto releases and recommend the upgrades detailed below.
Even if we're not managing Palo Alto devices for you, we want you to have the latest information to help keep your devices secure.
For the majority of Palo Alto devices we manage, NWG recommends either 11.1.10-h1 or 10.2.13-h7, depending on your hardware.
Note: Newer hardware is not capable of running older versions of PanOS. Virtual Palo Alto firewalls do not have this limitation. The compatibility matrix can be found here.
Support for PanOS 12.X begins with version 12.1.2. This version is not a preferred version for any hardware except the PA-5540, 5550, 5560, 5570, and 5580. These hardware platforms require 12.1.2 and cannot run older versions.
NWG does not recommend PanOS 12.1.2 at this time.
The current Palo Alto recommended version is 11.2.4-h7. PanOS 11.2.8 is the newest version but has some known issues that can have a high impact. Some of the issues are:
Bug ID: PAN-247728
When Advanced Routing is enabled, IP multicast is not supported. An upcoming version will provide support for this feature. Customers who have multicast configured or who plan to deploy multicast routing should not upgrade to 11.2.0. Additionally, when Advanced Routing is enabled, the BGP dampening configuration isn't applied to any peers or peer group; the configuration is preserved but has no effect on BGP. Customers can use BGP even if they have applied a Dampening profile to a specific set of peers. The issue doesn't affect any other BGP features.
Bug ID: PAN-187407
The configured Advanced Threat Prevention inline cloud analysis action for a given model might not be honored under the following condition: If the firewall is set to Hold client request for category lookup and the action set to Reset-Both and the URL cache has been cleared, the first request for inline cloud analysis will be bypassed.
Bug ID: PAN-236649
If you change the configuration of a firewall acting as a PPPoEv4 or PPPoEv6 client, old routes from the Forwarding Information Base (FIB) and route table for an inherited configuration with dynamic-identifier or client remain visible. Old routes also remain visible for an inherited interface when you execute the CLI command, show interface all.
NWG recommends PanOS 11.2.4-h7 for all devices that require PanOS 11.2.X. PanOS 11.2.X only has a ~5% adoption rate across Palo Alto platforms. NWG recommends earlier versions of PanOS where possible.
The current Palo Alto recommended version is 11.1.10-h1. PanOS 11.1.11 is the newest version, but was just released on 9/9/25 and has some known issues that have a high impact. The issues are:
Bug ID: PAN-293673
When the firewall generates a high volume of logs and attempts to export these logs to an FTP server, it may consume excessive memory leading to all PAN-OS processes crashing.
Bug ID: PAN-290088
When pushing configurations from Panorama to a firewall, a memory leak might occur in the firewall's configd process, particularly when the configurations contain shared policies. Each configuration push causes the configd process to consume additional memory that is not released after the commit completes.
Bug ID: PAN-285894
If the Preserve Pre-NAT feature is enabled, dataplane crashes may occur, which could result in firewall reboots.
NWG recommends PanOS 11.1.10-h1 for all devices that are capable of running 11.1. PanOS 11.1.X has the highest adoption rate across Palo Alto platforms.
The current Palo Alto recommended version is 10.2.13-h7. PanOS 10.2.16-h1 is the newest version, which was released on 7/2/25, and has some known issues that have a high impact. The issues are:
Bug ID: PAN-290088
When pushing configurations from Panorama to a firewall, a memory leak might occur in the firewall's configd process, particularly when the configurations contain shared policies. Each configuration push causes the configd process to consume additional memory that is not released after the commit completes.
Bug ID: PAN-266900
In Panorama, the OK button does not work when trying to install configurations to a managed firewall from the Managed Devices, Summary, Install section, even after selecting the update type and file from the drop-down menu and choosing the firewall.
Bug ID: PAN-187370
On a firewall with Advanced Routing enabled, if there is also a logical router instance that uses the default configuration and has no interfaces assigned to it, this will result in terminating the management daemon and main routing daemon in the firewall during commit.
NWG recommends PanOS 10.2.13-h7 for all devices that are capable of running 10.2. PanOS 10.2.X has the second-highest adoption rate across Palo Alto platforms and should be used for devices that are not capable of running 11.1.X.
The current Palo Alto recommended version is 10.1.14-h13. PanOS 10.1.14-h16 only addresses a low-severity CVE specific to SDWAN.
NWG recommends PanOS 10.1.14-h13 for all devices that are not capable of running 10.2. PanOS 10.1.X is nearing the end of support (3/21/26).
Security news, tips, webinars, and more straight to your inbox.