PT-2024-2752 · Palo Alto Networks · Pan-Os
Steven Adair
·
Published
2024-04-12
·
Updated
2025-11-29
·
CVE-2024-3400
CVSS v3.1
10
10
Critical
| Base vector | Vector | AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
Name of the Vulnerable Software and Affected Versions
Palo Alto Networks PAN-OS versions 10.2, 11.0, and 11.1
Description
Palo Alto Networks PAN-OS GlobalProtect feature is affected by a critical command injection vulnerability (CVE-2024-3400) with a CVSS score of 10.0. This vulnerability allows an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. The vulnerability stems from a path traversal leading to arbitrary file creation and subsequent command injection. Exploitation of this vulnerability has been observed in the wild since March 26, 2024, with threat actors potentially using it for reconnaissance, data exfiltration, and establishing persistence. The vulnerability affects devices with GlobalProtect enabled and telemetry features active. Attackers have been observed exploiting this vulnerability to deploy malicious payloads, including Python-based backdoors. Approximately 24,000 IP addresses have been observed probing for vulnerable devices.
Recommendations
Apply the hotfixes released by Palo Alto Networks to address CVE-2024-3400. Prioritize patching vulnerable systems. Consider generating a full tech support file of your Palo firewalls before patching to preserve artifacts for compromise detection.
Exploit
Fix
RCE
Command Injection
Found an issue in the description? Have something to add? Feel free to write us 👾
dbugs@ptsecurity.com
Related Identifiers
BDU:2024-02881
CVE-2024-3400
GO-2024-2730
Affected Products
Pan-Os
References · 797
- 🔥 https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_telemetry_cmd_exec.rb⭐ 34266 🔗 14003 · Exploit
- 🔥 https://github.com/h4x0r-dz/CVE-2024-3400⭐ 150 🔗 24 · Exploit
- 🔥 https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan⭐ 85 🔗 8 · Exploit
- 🔥 https://github.com/W01fh4cker/CVE-2024-3400-RCE⭐ 85 🔗 8 · Exploit
- 🔥 https://github.com/0x0d3ad/CVE-2024-3400⭐ 63 🔗 24 · Exploit
- 🔥 https://github.com/ihebski/CVE-2024-3400⭐ 18 🔗 4 · Exploit
- 🔥 https://github.com/momika233/CVE-2024-3400⭐ 13 🔗 4 · Exploit
- 🔥 https://github.com/Chocapikk/CVE-2024-3400⭐ 12 🔗 3 · Exploit
- 🔥 https://github.com/Yuvvi01/CVE-2024-3400⭐ 9 🔗 5 · Exploit
- 🔥 https://github.com/ak1t4/CVE-2024-3400⭐ 10 🔗 2 · Exploit
- 🔥 https://github.com/AdaniKamal/CVE-2024-3400⭐ 7 🔗 4 · Exploit
- 🔥 https://github.com/schooldropout1337/CVE-2024-3400⭐ 5 🔗 2 · Exploit
- 🔥 https://github.com/zam89/CVE-2024-3400-pot⭐ 6 🔗 1 · Exploit
- 🔥 https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection⭐ 4 🔗 2 · Exploit
- 🔥 https://github.com/XiaomingX/CVE-2024-3400-poc⭐ 4 · Exploit