Skip to main content

CVE-2024-3400

Description

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.

Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Palo Alto Networks, Inc.
Severity: CRITICAL
CVE ID: CVE-2024-3400
CVSS Score: 10.0
CVSS Metrics: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Refrence: NVDMITRE

Proof Of Concept

Nuclei Templates for CVE-2024-3400
Yuvvi01

Refrence: GitHub

CerTusHack

Refrence: GitHub

0x0d3ad

CVE-2024-3400

Refrence: GitHub

FoxyProxys

Refrence: GitHub

momika233

Refrence: GitHub

MrR0b0t19

Vulnerabilidad de palo alto

Refrence: GitHub

MurrayR0123

A simple bash script to check for evidence of compromise related to CVE-2024-3400

Refrence: GitHub

AdaniKamal

CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect

Refrence: GitHub

LoanVitor

Refrence: GitHub

h4x0r-dz

CVE-2024-3400 Palo Alto OS Command Injection

Refrence: GitHub

W01fh4cker

CVE-2024-3400-RCE

Refrence: GitHub

CONDITIONBLACK

Refrence: GitHub

Chocapikk

Refrence: GitHub

ihebski

CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect

Refrence: GitHub

index2014

A check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability. Palo Alto 防火墙 PAN-OS 远程命令注入检测程序。

Refrence: GitHub

ZephrFish

Have we not learnt from HoneyPoC?

Refrence: GitHub

ak1t4

Global Protec Palo Alto File Write Exploit

Refrence: GitHub

phantomradar

Simple POC for CVE-2024-3400

Refrence: GitHub

retkoussa

CVE-2024-3400 : Palo Alto OS Command Injection - POC

Refrence: GitHub

schooldropout1337

Refrence: GitHub

hahasagined

EDL for IPs attacking customers with CVE-2024-3400

Refrence: GitHub

codeblueprint

Simple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400

Refrence: GitHub

swaybs

Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts

Refrence: GitHub

sxyrxyy

Refrence: GitHub

Ravaan21

CVE-2024-3400 POC written in Rust and Python

Refrence: GitHub

pwnj0hn

Finding Palo Alto devices vulnerable to CVE-2024-3400.

Refrence: GitHub

HackingLZ

Extract useful information from PANOS support file for CVE-2024-3400

Refrence: GitHub

stronglier

Exploit for CVE-2024-3400

Refrence: GitHub

Kr0ff

Python exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation

Refrence: GitHub

zam89

Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability

Refrence: GitHub

terminalJunki3

Check to see if your Palo Alto firewall has been compromised by running script againt support bundle.

Refrence: GitHub

0xr2r

Refrence: GitHub

marconesler

Exploit for GlobalProtect CVE-2024-3400

Refrence: GitHub