PAN-OS GlobalProtect Command Injection Vulnerability
Watch Video
PAN-OS GlobalProtect Command Injection Vulnerability Video
An actively exploited critical vulnerability in the PAN-OS Global Protect
The attack on PAN-OS GlobalProtect devices identified as CVE-2024-3400 allows a malicious actor to remotely exploit an unauthenticated command injection vulnerability that leads to remote code execution. Once established, the attacker can further collect configurations, deliver malware payloads and move laterally and internally. Learn More »
Common Vulnerabilities and Exposures
Background
The GlobalProtect Gateway provides security solution for roaming users by extending the same next-generation firewall-based policies.
Latest Development
Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.
The FortiGuard is continuously monitoring and investigating the attack to increase protection coverages and reduce the attack surface.
April 15, 2024: FortiGuard released an IPS signature to detect and block exploitation attempts targetting edge devices.
Also, FortiGuard published an Outbreak walkthrough video.
https://www.fortiguard.com/encyclopedia/ips/55555
April 12, 2024: FortiGuard published this Outbreak Alert report.
April 12, 2024: FortiGuard issued a Threat Signal.
https://www.fortiguard.com/threat-signal-report/5423/pan-os-critical-flaw-in-globalprotect-gateway-cve-2024-3400
April 11, 2024: Palo Alto Networks released a security advisory on their GlobalProtect.
https://security.paloaltonetworks.com/CVE-2024-3400
April 10, 2024: Volexity identified zero-day exploitation of a vulnerability found within the GlobalProtect.
https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/
Attack Sequence
Actions taken by cyber attacker or a malicious entity to compromise a target system or network.
Attack Sequence
Attack Sequence Video
FortiGuard Cybersecurity Framework
Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.
-
Lure
-
Decoy VM
-
AV
-
Web App Security
-
IPS
-
IOC
-
Outbreak Detection
-
Threat Hunting
-
Playbook
-
Automated Response
-
Assisted Response Services
-
NOC/SOC Training
-
End-User Training
-
Attack Surface Hardening
-
Business Reputation
-
Attack Surface Monitoring (Inside & Outside)
-
Inventory Management
Decoy VM
AV Detects known malware related to the Outbreak
Web App Security Detects and blocks attack attempts leveraging the vulnerability
IPS Detects and blocks attack attempts leveraging the vulnerability
Outbreak Detection
Threat Hunting
Playbook
Automated Response Services that can automaticlly respond to this outbreak.
Assisted Response Services Experts to assist you with analysis, containment and response activities.
NOC/SOC Training Train your network and security professionals and optimize your incident response to stay on top of the cyberattacks.
End-User Training Raise security awareness to your employees that are continuously being targeted by phishing, drive-by download and other forms of cyberattacks.
Attack Surface Hardening Check Security Fabric devices to build actionable configuration recommendations and key indicators.
Business Reputation Know attackers next move to protect against your business branding.
Attack Surface Monitoring (Inside & Outside) Security reconnaissance and penetration testing services, covering both internal & external attack vectors, including those introduced internally via software supply chain.
Inventory Management Check Security Fabric devices to build actionable configuration recommendations and key indicators.
Threat Intelligence
Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.
Loading ...
IOC Indicator List
Mitre Matrix
Click here for the ATT&CK Matrix
References
Sources of information in support and relation to this Outbreak and vendor.