CVE-2024-3400
CRITICAL KEV RANSOMWARE NUCLEIPalo Alto Networks PAN-OS Unauthenticated Remote Code Execution
Title source: metasploitDescription
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Exploits (49)
nomisec
WORKING POC
90 stars
by W01fh4cker · remote
https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan
nomisec
WORKING POC
6 stars
by 0xr2r · remote
https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection
nomisec
WORKING POC
5 stars
by schooldropout1337 · remote
https://github.com/schooldropout1337/CVE-2024-3400
nomisec
WRITEUP
1 stars
by hashdr1ft · remote
https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400
nomisec
WORKING POC
1 stars
by CONDITIONBLACK · remote
https://github.com/CONDITIONBLACK/CVE-2024-3400-POC
nomisec
WRITEUP
by Zedocun · poc
https://github.com/Zedocun/PAN-OS-CVE-2024-3400-Command-Injection-Investigation
nomisec
WRITEUP
by CyberBibs · poc
https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400-
nomisec
WRITEUP
by CyprianAtsyor · poc
https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study
nomisec
SCANNER
by MurrayR0123 · poc
https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
metasploit
WORKING POC
EXCELLENT
by remmons-r7, sfewer-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_telemetry_cmd_exec.rb
Nuclei Templates (1)
GlobalProtect - OS Command Injection
CRITICALVERIFIEDby salts,parthmalhotra
Shodan:
http.favicon.hash:-631559155 || http.favicon.hash:"-631559155" || cpe:"cpe:2.3:o:paloaltonetworks:pan-os"
FOFA:
icon_hash="-631559155"
References (5)
Scores
CVSS v3
10.0
EPSS
0.9432
EPSS Percentile
100.0%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Details
CISA KEV
2024-04-12
VulnCheck KEV
2024-04-12
InTheWild.io
2024-04-12
ENISA EUVD
EUVD-2024-31989
Ransomware Use
Confirmed
CWE
CWE-20
CWE-77
Status
published
Products (17)
paloaltonetworks/pan-os
10.2.0 (3 CPE variants)
paloaltonetworks/pan-os
10.2.1 (2 CPE variants)
paloaltonetworks/pan-os
10.2.2 (4 CPE variants)
paloaltonetworks/pan-os
10.2.3 (6 CPE variants)
paloaltonetworks/pan-os
10.2.4 (5 CPE variants)
paloaltonetworks/pan-os
10.2.5 (3 CPE variants)
paloaltonetworks/pan-os
10.2.6 (2 CPE variants)
paloaltonetworks/pan-os
10.2.7 (4 CPE variants)
paloaltonetworks/pan-os
10.2.8
paloaltonetworks/pan-os
10.2.9
... and 7 more
Published
Apr 12, 2024
KEV Added
Apr 12, 2024
Tracked Since
Feb 18, 2026