Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.
| Vendor | Product | Affected Versions | CPE | Subscribe |
|---|---|---|---|---|
| Palo Alto Networks | PAN-OS | 10.2.0 ~ 10.2.9-h1 | - | |
| Palo Alto Networks | Cloud NGFW | - | - | |
| Palo Alto Networks | Prisma Access | - | - |
| # | POC Description | Source Link | Shenlong Link |
|---|---|---|---|
| 1 | This script is designed to demonstrate the exploitation of vulnerabilities in PAN-OS firewalls. It sends a specially crafted payload to the firewall's API endpoint to execute arbitrary commands. | https://github.com/DrewskyDev/CVE-2024-3400 | POC Details |
| 2 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/bigsclowns/CVE-2024-3400-POC | POC Details |
| 3 | None | https://github.com/Yuvvi01/CVE-2024-3400 | POC Details |
| 4 | CVE-2024-3400 Checker | https://github.com/shamo0/CVE-2024-3400 | POC Details |
| 5 | None | https://github.com/CerTusHack/CVE-2024-3400-PoC | POC Details |
| 6 | None | https://github.com/0x0d3ad/CVE-2024-3400 | POC Details |
| 7 | None | https://github.com/FoxyProxys/CVE-2024-3400 | POC Details |
| 8 | None | https://github.com/momika233/CVE-2024-3400 | POC Details |
| 9 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/kerberoshacker/CVE-2024-3400-POC | POC Details |
| 10 | Vulnerabilidad de palo alto | https://github.com/MrR0b0t19/CVE-2024-3400 | POC Details |
| 11 | A simple bash script to check for evidence of compromise related to CVE-2024-3400 | https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker | POC Details |
| 12 | CVE-2024-3400 POC Remote Code Execution (RCE) Palo Alto Networks PAN-OS software | https://github.com/kerberoshacker2/CVE-2024-3400-POC | POC Details |
| 13 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | https://github.com/AdaniKamal/CVE-2024-3400 | POC Details |
| 14 | None | https://github.com/LoanVitor/CVE-2024-3400- | POC Details |
| 15 | CVE-2024-3400 Palo Alto OS Command Injection | https://github.com/h4x0r-dz/CVE-2024-3400 | POC Details |
| 16 | CVE-2024-3400 | https://github.com/W01fh4cker/CVE-2024-3400 | POC Details |
| 17 | None | https://github.com/CONDITIONBLACK/CVE-2024-3400-POC | POC Details |
| 18 | None | https://github.com/Chocapikk/CVE-2024-3400 | POC Details |
| 19 | CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect | https://github.com/ihebski/CVE-2024-3400 | POC Details |
| 20 | CVE-2024-3400-RCE | https://github.com/W01fh4cker/CVE-2024-3400-RCE | POC Details |
| 21 | A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。 | https://github.com/index2014/CVE-2024-3400-Checker | POC Details |
| 22 | CVE-2024-3400-RCE | https://github.com/admi-n/CVE-2024-3400-RCE-copy | POC Details |
| 23 | Have we not learnt from HoneyPoC? | https://github.com/ZephrFish/CVE-2024-3400-Canary | POC Details |
| 24 | Global Protec Palo Alto File Write Exploit | https://github.com/ak1t4/CVE-2024-3400 | POC Details |
| 25 | Simple POC for CVE-2024-3400 | https://github.com/phantomradar/cve-2024-3400-poc | POC Details |
| 26 | CVE-2024-3400 : Palo Alto OS Command Injection - POC | https://github.com/retkoussa/CVE-2024-3400 | POC Details |
| 27 | None | https://github.com/schooldropout1337/CVE-2024-3400 | POC Details |
| 28 | EDL for IPs attacking customers with CVE-2024-3400 | https://github.com/hahasagined/CVE-2024-3400 | POC Details |
| 29 | Simple Python code to check for arbitrary uploading | https://github.com/codeblueprint/CVE-2024-3400 | POC Details |
| 30 | Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts | https://github.com/swaybs/CVE-2024-3400 | POC Details |
| 31 | None | https://github.com/sxyrxyy/CVE-2024-3400-Check | POC Details |
| 32 | CVE-2024-3400 POC written in Rust and Python | https://github.com/Ravaan21/CVE-2024-3400 | POC Details |
| 33 | Finding Palo Alto devices vulnerable to CVE-2024-3400. | https://github.com/pwnj0hn/CVE-2024-3400 | POC Details |
| 34 | CVE-2024-3400-RCE | https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan | POC Details |
| 35 | Extract useful information from PANOS support file for CVE-2024-3400 | https://github.com/HackingLZ/panrapidcheck | POC Details |
| 36 | Exploit for CVE-2024-3400 | https://github.com/stronglier/CVE-2024-3400 | POC Details |
| 37 | Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation | https://github.com/Kr0ff/cve-2024-3400 | POC Details |
| 38 | Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability | https://github.com/zam89/CVE-2024-3400-pot | POC Details |
| 39 | Check to see if your Palo Alto firewall has been compromised by running script againt support bundle. | https://github.com/terminalJunki3/CVE-2024-3400-Checker | POC Details |
| 40 | None | https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection | POC Details |
| 41 | Exploit for GlobalProtect CVE-2024-3400 | https://github.com/marconesler/CVE-2024-3400 | POC Details |
| 42 | None | https://github.com/andrelia-hacks/CVE-2024-3400 | POC Details |
| 43 | Find rows contain specific IP addresses in large files and then, extract them. This tool make for investigating logs for cve-2024-3400 | https://github.com/tk-sawada/IPLineFinder | POC Details |
| 44 | None | https://github.com/iwallarm/cve-2024-3400 | POC Details |
| 45 | Simple POC for CVE-2024-3400 | https://github.com/tfrederick74656/cve-2024-3400-poc | POC Details |
| 46 | Attempt at making the CVE-2024-3400 initial exploit (for educational purposes) | https://github.com/workshop748/CVE-2024-3400 | POC Details |
| 47 | CVE-2024-3400 PAN-OS Vulnerability Scanner. | https://github.com/nanwinata/CVE-2024-3400 | POC Details |
| 48 | CVE-2024-3400的攻击脚本 | https://github.com/XiaomingX/CVE-2024-3400-poc | POC Details |
| 49 | None | https://github.com/drake044/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400 | POC Details |
| 50 | None | https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400 | POC Details |
| 51 | A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3400.yaml | POC Details |
| 52 | Detection, analysis, and response strategies for CVE-2024-3400 exploitation attempts targeting Palo Alto PAN-OS GlobalProtect portals. Includes IOCs, exploit patterns, and mitigation guidance. | https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study | POC Details |
| 53 | An AI-powered tool to predict and prevent zero-day attacks on firewalls, like Palo Alto’s CVE-2024-3400. Uses Python, Wireshark, MITRE ATT&CK datasets, and Docker for real-time anomaly detection. | https://github.com/Rohith-Reddy-Y/Zero-Day-Vulnerability-Exploitation-Detection-Tool | POC Details |
| 54 | None | https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400- | POC Details |
| 55 | CS50 Cybersecurity final project — Palo Alto OAuth token breach (CVE-2024-3400) | https://github.com/Yafiah-Darwesh/cs50-cyber-paloalto-oauth | POC Details |
| 56 | CVE-2024-3400的攻击脚本 | https://github.com/GhassanSabir/CVE-2024-3400-poc | POC Details |
No public POC found.
Login to generate AI POCNo comments yet