CVE-2024-3400
Description
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.
Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Severity: CRITICAL
CVE ID: CVE-2024-3400
CVSS Score: 10.0
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Proof Of Concept
Nuclei Templates for CVE-2024-3400
Refrence: Project Discovery GitHub
Yuvvi01
Refrence: GitHub
CerTusHack
Refrence: GitHub
0x0d3ad
CVE-2024-3400
Refrence: GitHub
FoxyProxys
Refrence: GitHub
momika233
Refrence: GitHub
MrR0b0t19
Vulnerabilidad de palo alto
Refrence: GitHub
MurrayR0123
A simple bash script to check for evidence of compromise related to CVE-2024-3400
Refrence: GitHub
AdaniKamal
CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect
Refrence: GitHub
LoanVitor
Refrence: GitHub
h4x0r-dz
CVE-2024-3400 Palo Alto OS Command Injection
Refrence: GitHub
W01fh4cker
CVE-2024-3400-RCE
Refrence: GitHub
CONDITIONBLACK
Refrence: GitHub
Chocapikk
Refrence: GitHub
ihebski
CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect
Refrence: GitHub
index2014
A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。
Refrence: GitHub
ZephrFish
Have we not learnt from HoneyPoC?
Refrence: GitHub
ak1t4
Global Protec Palo Alto File Write Exploit
Refrence: GitHub
phantomradar
Simple POC for CVE-2024-3400
Refrence: GitHub
retkoussa
CVE-2024-3400 : Palo Alto OS Command Injection - POC
Refrence: GitHub
schooldropout1337
Refrence: GitHub
hahasagined
EDL for IPs attacking customers with CVE-2024-3400
Refrence: GitHub
codeblueprint
Simple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400
Refrence: GitHub
swaybs
Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts
Refrence: GitHub
sxyrxyy
Refrence: GitHub
Ravaan21
CVE-2024-3400 POC written in Rust and Python
Refrence: GitHub
pwnj0hn
Finding Palo Alto devices vulnerable to CVE-2024-3400.
Refrence: GitHub
HackingLZ
Extract useful information from PANOS support file for CVE-2024-3400
Refrence: GitHub
stronglier
Exploit for CVE-2024-3400
Refrence: GitHub
Kr0ff
Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation
Refrence: GitHub
zam89
Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability
Refrence: GitHub
terminalJunki3
Check to see if your Palo Alto firewall has been compromised by running script againt support bundle.
Refrence: GitHub
0xr2r
Refrence: GitHub
marconesler
Exploit for GlobalProtect CVE-2024-3400
Refrence: GitHub