Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3400— PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

CVSS 10.0 · Critical KEV · Ransomware EPSS 94.30% · P100
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-3400

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect
Source: NVD (National Vulnerability Database)
Vulnerability Description
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
在命令中使用的特殊元素转义处理不恰当(命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks PAN-OS 命令注入漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks PAN-OS是美国Palo Alto Networks公司的一款下一代防火墙软件。 Palo Alto Networks PAN-OS 10.2、11.0、11.1存在命令注入漏洞,该漏洞源于GlobalProtect 功能中存在命令注入漏洞,可能使未经身份验证的攻击者在防火墙上以 root权限执行任意代码。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksPAN-OS 10.2.0 ~ 10.2.9-h1 -
Palo Alto NetworksCloud NGFW--
Palo Alto NetworksPrisma Access--

II. Public POCs for CVE-2024-3400

#POC DescriptionSource LinkShenlong Link
1This script is designed to demonstrate the exploitation of vulnerabilities in PAN-OS firewalls. It sends a specially crafted payload to the firewall's API endpoint to execute arbitrary commands.https://github.com/DrewskyDev/CVE-2024-3400POC Details
2CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS softwarehttps://github.com/bigsclowns/CVE-2024-3400-POCPOC Details
3Nonehttps://github.com/Yuvvi01/CVE-2024-3400POC Details
4CVE-2024-3400 Checkerhttps://github.com/shamo0/CVE-2024-3400POC Details
5Nonehttps://github.com/CerTusHack/CVE-2024-3400-PoCPOC Details
6Nonehttps://github.com/0x0d3ad/CVE-2024-3400POC Details
7Nonehttps://github.com/FoxyProxys/CVE-2024-3400POC Details
8Nonehttps://github.com/momika233/CVE-2024-3400POC Details
9CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS softwarehttps://github.com/kerberoshacker/CVE-2024-3400-POCPOC Details
10Vulnerabilidad de palo alto https://github.com/MrR0b0t19/CVE-2024-3400POC Details
11A simple bash script to check for evidence of compromise related to CVE-2024-3400https://github.com/MurrayR0123/CVE-2024-3400-Compromise-CheckerPOC Details
12CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS softwarehttps://github.com/kerberoshacker2/CVE-2024-3400-POCPOC Details
13CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtecthttps://github.com/AdaniKamal/CVE-2024-3400POC Details
14Nonehttps://github.com/LoanVitor/CVE-2024-3400-POC Details
15CVE-2024-3400 Palo Alto OS Command Injectionhttps://github.com/h4x0r-dz/CVE-2024-3400POC Details
16CVE-2024-3400https://github.com/W01fh4cker/CVE-2024-3400POC Details
17Nonehttps://github.com/CONDITIONBLACK/CVE-2024-3400-POCPOC Details
18Nonehttps://github.com/Chocapikk/CVE-2024-3400POC Details
19CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtecthttps://github.com/ihebski/CVE-2024-3400POC Details
20CVE-2024-3400-RCEhttps://github.com/W01fh4cker/CVE-2024-3400-RCEPOC Details
21A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。https://github.com/index2014/CVE-2024-3400-CheckerPOC Details
22CVE-2024-3400-RCEhttps://github.com/admi-n/CVE-2024-3400-RCE-copyPOC Details
23Have we not learnt from HoneyPoC?https://github.com/ZephrFish/CVE-2024-3400-CanaryPOC Details
24Global Protec Palo Alto File Write Exploithttps://github.com/ak1t4/CVE-2024-3400POC Details
25Simple POC for CVE-2024-3400https://github.com/phantomradar/cve-2024-3400-pocPOC Details
26CVE-2024-3400 : Palo Alto OS Command Injection - POChttps://github.com/retkoussa/CVE-2024-3400POC Details
27Nonehttps://github.com/schooldropout1337/CVE-2024-3400POC Details
28EDL for IPs attacking customers with CVE-2024-3400 https://github.com/hahasagined/CVE-2024-3400POC Details
29Simple Python code to check for arbitrary uploadinghttps://github.com/codeblueprint/CVE-2024-3400POC Details
30Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attemptshttps://github.com/swaybs/CVE-2024-3400POC Details
31Nonehttps://github.com/sxyrxyy/CVE-2024-3400-CheckPOC Details
32CVE-2024-3400 POC written in Rust and Pythonhttps://github.com/Ravaan21/CVE-2024-3400POC Details
33Finding Palo Alto devices vulnerable to CVE-2024-3400.https://github.com/pwnj0hn/CVE-2024-3400POC Details
34CVE-2024-3400-RCEhttps://github.com/W01fh4cker/CVE-2024-3400-RCE-ScanPOC Details
35Extract useful information from PANOS support file for CVE-2024-3400https://github.com/HackingLZ/panrapidcheckPOC Details
36Exploit for CVE-2024-3400https://github.com/stronglier/CVE-2024-3400POC Details
37Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creationhttps://github.com/Kr0ff/cve-2024-3400POC Details
38Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerabilityhttps://github.com/zam89/CVE-2024-3400-potPOC Details
39Check to see if your Palo Alto firewall has been compromised by running script againt support bundle. https://github.com/terminalJunki3/CVE-2024-3400-CheckerPOC Details
40Nonehttps://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-InjectionPOC Details
41Exploit for GlobalProtect CVE-2024-3400https://github.com/marconesler/CVE-2024-3400POC Details
42Nonehttps://github.com/andrelia-hacks/CVE-2024-3400POC Details
43Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400https://github.com/tk-sawada/IPLineFinderPOC Details
44Nonehttps://github.com/iwallarm/cve-2024-3400POC Details
45Simple POC for CVE-2024-3400https://github.com/tfrederick74656/cve-2024-3400-pocPOC Details
46Attempt at making the CVE-2024-3400 initial exploit (for educational purposes)https://github.com/workshop748/CVE-2024-3400POC Details
47CVE-2024-3400 PAN-OS Vulnerability Scanner.https://github.com/nanwinata/CVE-2024-3400POC Details
48CVE-2024-3400的攻击脚本https://github.com/XiaomingX/CVE-2024-3400-pocPOC Details
49Nonehttps://github.com/drake044/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400POC Details
50Nonehttps://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400POC Details
51A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3400.yamlPOC Details
52Detection, analysis, and response strategies for CVE-2024-3400 exploitation attempts targeting Palo Alto PAN-OS GlobalProtect portals. Includes IOCs, exploit patterns, and mitigation guidance.https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-studyPOC Details
53An AI-powered tool to predict and prevent zero-day attacks on firewalls, like Palo Alto’s CVE-2024-3400. Uses Python, Wireshark, MITRE ATT&CK datasets, and Docker for real-time anomaly detection.https://github.com/Rohith-Reddy-Y/Zero-Day-Vulnerability-Exploitation-Detection-ToolPOC Details
54Nonehttps://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400-POC Details
55CS50 Cybersecurity final project — Palo Alto OAuth token breach (CVE-2024-3400)https://github.com/Yafiah-Darwesh/cs50-cyber-paloalto-oauthPOC Details
56CVE-2024-3400的攻击脚本https://github.com/GhassanSabir/CVE-2024-3400-pocPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-3400

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2024-3400

No comments yet


Leave a comment