CVE-2024-3400Exploit Available
PAN-OS GlobalProtect OS Command Injection (Zero-Day)
🏭 Palo Alto NetworksCWE-77#Zero-Day#RCE#Firewall#Network Perimeter#Actively Exploited
10.0Critical
010.0
Vulnerability Description
A critical command injection zero-day in Palo Alto Networks PAN-OS GlobalProtect Gateway allows an unauthenticated attacker to execute arbitrary OS commands with root privileges on affected firewalls. Actively exploited in the wild.
Recommended Mitigation
Apply Palo Alto hotfix immediately. If unable to patch, disable GlobalProtect or enable Threat Prevention subscription. Add "Command and Control" signatures to block known IOCs.
Affected Products
PAN-OS GlobalProtect
Palo Alto Networks Firewall
Version constraint: PAN-OS 11.1 < 11.1.2-h3, PAN-OS 11.0 < 11.0.4-h1, PAN-OS 10.2 < 10.2.9-h1
Quick Facts
- Published
- 2024-04-12
- Last Modified
- 2024-04-15
- Vendor
- Palo Alto Networks
- CWE
- CWE-77
- Exploit
- ⚠️ Public Exploit Exists
CVSS Vector
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H