PT-2024-2752 · Palo Alto Networks · Pan-Os
Steven Adair
·
Published
2024-04-12
·
Updated
2026-01-15
·
CVE-2024-3400
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Palo Alto Networks PAN-OS versions 10.2, 11.0, and 11.1
Description
Palo Alto Networks PAN-OS GlobalProtect feature is vulnerable to an unauthenticated remote code execution (RCE) vulnerability (CVE-2024-3400) with a CVSS score of 10.0. This vulnerability allows attackers to execute arbitrary code with root privileges on the firewall. The vulnerability is due to a command injection flaw resulting from arbitrary file creation. Attackers have been observed exploiting this vulnerability in the wild since March 26, 2024, with some reports indicating activity by the threat actor known as UTA0218. Exploitation involves leveraging a path traversal vulnerability to write files and then executing commands. A Python backdoor, UPSTYLE, has been observed being deployed by attackers. Approximately 24,000 systems were observed being scanned for this vulnerability. The API endpoint
/ssl-vpn/hipreport.esp is involved in the exploitation.Recommendations
Apply the hotfixes released by Palo Alto Networks to address CVE-2024-3400. Prioritize patching systems running vulnerable versions of PAN-OS (10.2, 11.0, and 11.1).
Exploit
Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2024-02881
CVE-2024-3400
GO-2024-2730
Affected Products
Pan-Os
References · 798
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_telemetry_cmd_exec.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/h4x0r-dz/CVE-2024-3400⭐ 150 🔗 24 · Exploit
- 🔥 https://github.com/W01fh4cker/CVE-2024-3400-RCE⭐ 85 🔗 8 · Exploit
- 🔥 https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan⭐ 85 🔗 8 · Exploit
- 🔥 https://github.com/0x0d3ad/CVE-2024-3400⭐ 63 🔗 24 · Exploit
- 🔥 https://github.com/ihebski/CVE-2024-3400⭐ 18 🔗 4 · Exploit
- 🔥 https://github.com/momika233/CVE-2024-3400⭐ 13 🔗 4 · Exploit
- 🔥 https://github.com/Chocapikk/CVE-2024-3400⭐ 12 🔗 3 · Exploit
- 🔥 https://github.com/Yuvvi01/CVE-2024-3400⭐ 9 🔗 5 · Exploit
- 🔥 https://github.com/ak1t4/CVE-2024-3400⭐ 10 🔗 2 · Exploit
- 🔥 https://github.com/AdaniKamal/CVE-2024-3400⭐ 7 🔗 4 · Exploit
- 🔥 https://github.com/zam89/CVE-2024-3400-pot⭐ 6 🔗 1 · Exploit
- 🔥 https://github.com/schooldropout1337/CVE-2024-3400⭐ 5 🔗 2 · Exploit
- 🔥 https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection⭐ 4 🔗 2 · Exploit
- 🔥 https://github.com/XiaomingX/CVE-2024-3400-poc⭐ 4 · Exploit