CVE-2024-3400

CVE Published 2024-04-12
Related CWE(s) CWE-20: Improper Input Validation, CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection')
Related Vendor(s) paloaltonetworks
Related Product(s) pan-os
Exploitation Reported (CISA KEV) 2024-04-12
CVSS 3 Base Score 10.0 (CRITICAL)
CVSS 3 Attack Complexity LOW
CVSS 3 Attack Vector NETWORK

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.

Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Cyber Threat Graph Context

Explore how this CVE relates to the wider threat graph

Threat Reports Related to CVE-2024-3400

Report

Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)

This blog post from Volexity details exploitation of CVE-2024-3400 in the GlobalProtect feature of Palo Alto Networks PAN-OS. The threat actor, ...

Associated CAPEC Patterns

References