Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-3400 PoC — PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

Source
Associated Vulnerability
Title:PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect (CVE-2024-3400)
Description:A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Description
A simple bash script to check for evidence of compromise related to CVE-2024-3400
Readme
# CVE-2024-3400 Compromise Checker
A very simple bash script to check for evidence of compromise related to CVE-2024-3400 on Palo Alto Firewalls.

Designed to provide a quick initial triage of potentially impacted devices by checking for the existence of artefacts outlined in the Volexity writeup and deFroggy's blog post.

Usage: ./cve-2024-3400_checker.sh


For more detailed information regarding the vulnerability itself and the IOCs this script checks for, please check out the respective publications below:
* https://security.paloaltonetworks.com/CVE-2024-3400
* https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/
* https://github.com/deFr0ggy/deFr0ggy.github.io/blob/29806acfdab0b850b8e53542116c6098f498be97/_posts/2024-04-13-Palo%20Alto%20Exploit%20Analysis%20of%20CVE-2024-3400.md#L4

Disclaimer: As public exploits become availabe, the scope of activity is likely to increase and TTPs will almost certainly change. This script may not provide complete detection for all malicious activity and was made with best intentions to allow first responders to perform an initial triage of potentially impacted devices. Further investigation is highly recommended with reference to the technical blog posts above. Please test before running on production systems. The scripts provided here are offered as-is, without warranty of any kind, express or implied. The author assumes no responsibility or liability for any damages or problems resulting from the use of these scripts. Use these scripts at your own risk. By using these scripts, you agree to these terms and conditions.


File Snapshot

[4.0K] /data/pocs/960b9b826087cced9347041525f83b52b6c223fa ├── [2.7K] cve-2024-3400_checker.sh └── [1.6K] README.md 0 directories, 2 files
Shenlong Bot has cached this for you
Remarks
    1. It is advised to access via the original source first.
    2. Local POC snapshots are reserved for subscribers — if the original source is unavailable, the local mirror is part of the paid plan.
    3. Mirroring, verifying, and maintaining this POC archive takes ongoing effort, so local snapshots are a paid feature. Your subscription keeps the archive online — thank you for the support. View subscription plans →