Palo.Alto.Networks.GlobalProtect.Command.Injection

description-logoDescription

This indicates an attack attempt to exploit a command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS.
The vulnerability is due to an error in the GlobalProtect when handling a maliciously crafted request. An unauthenticated remote attacker may be able to exploit this to execute arbitrary code with root privileges on the firewall.

description-logoOutbreak Alert

The attack on PAN-OS GlobalProtect devices identified as CVE-2024-3400 allows a malicious actor to remotely exploit an unauthenticated command injection vulnerability that leads to remote code execution. Once established, the attacker can further collect configurations, deliver malware payloads and move laterally and internally.

View the full Outbreak Alert Report

affected-products-logoAffected Products

PAN-OS 11.1 versions earlier than PAN-OS 11.1.2-h3
PAN-OS 11.0 versions earlier than PAN-OS 11.0.4-h1
PAN-OS 10.2 versions earlier than PAN-OS 10.2.9-h1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Apply the most recent upgrade or patch from the vendor.
https://security.paloaltonetworks.com/CVE-2024-3400

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2024-05-01 27.778 Sig Added
2024-04-24 27.774 Sig Added
2024-04-17 27.770 Default_action:pass:drop
2024-04-15 27.768