Exploit for GlobalProtect CVE-2024-3400# CVE-2024-3400
Exploit for GlobalProtect CVE-2024-3400
This exploit targets the original vulnerability, so the firewall must be running a vulnerable PAN-OS version and must have telemetry enabled.
Ref: https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/
Sample RCE with remote connect back shell:

On remote host:

[4.0K] /data/pocs/d732e11de2ebdb5a11a613a7251acae35c6bbf4f
├── [3.0K] cve-2024-3400.py
├── [4.0K] img
│ ├── [255K] listener.png
│ └── [ 95K] request.png
└── [ 408] README.md
1 directory, 4 files