CVE-2024-3400

CRITICAL KEV RANSOMWARE NUCLEI

Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution

Title source: metasploit

Description

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Exploits (46)

nomisec WORKING POC 161 stars
by h4x0r-dz · poc
https://github.com/h4x0r-dz/CVE-2024-3400
nomisec WORKING POC 90 stars
by W01fh4cker · remote
https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan
nomisec WORKING POC 72 stars
by 0x0d3ad · poc
https://github.com/0x0d3ad/CVE-2024-3400
nomisec WORKING POC 30 stars
by ihebski · remote
https://github.com/ihebski/CVE-2024-3400
nomisec WORKING POC 14 stars
by Chocapikk · remote
https://github.com/Chocapikk/CVE-2024-3400
nomisec BACKDOOR: TROJAN 13 stars
by momika233 · poc
https://github.com/momika233/CVE-2024-3400
nomisec WORKING POC 11 stars
by Yuvvi01 · poc
https://github.com/Yuvvi01/CVE-2024-3400
nomisec WORKING POC 9 stars
by ak1t4 · remote
https://github.com/ak1t4/CVE-2024-3400
nomisec SCANNER 7 stars
by AdaniKamal · poc
https://github.com/AdaniKamal/CVE-2024-3400
nomisec WORKING POC 6 stars
by 0xr2r · remote
https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection
nomisec WORKING POC 6 stars
by zam89 · poc
https://github.com/zam89/CVE-2024-3400-pot
nomisec WORKING POC 5 stars
by schooldropout1337 · remote
https://github.com/schooldropout1337/CVE-2024-3400
nomisec WORKING POC 5 stars
by retkoussa · remote
https://github.com/retkoussa/CVE-2024-3400
nomisec WORKING POC 2 stars
by ZephrFish · remote
https://github.com/ZephrFish/CVE-2024-3400-Canary
nomisec STUB 2 stars
by CerTusHack · poc
https://github.com/CerTusHack/CVE-2024-3400-PoC
nomisec SCANNER 2 stars
by HackingLZ · poc
https://github.com/HackingLZ/panrapidcheck
nomisec WORKING POC 2 stars
by marconesler · remote
https://github.com/marconesler/CVE-2024-3400
nomisec SCANNER 2 stars
by swaybs · poc
https://github.com/swaybs/CVE-2024-3400
nomisec WRITEUP 1 stars
by hashdr1ft · remote
https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400
nomisec WORKING POC 1 stars
by CONDITIONBLACK · remote
https://github.com/CONDITIONBLACK/CVE-2024-3400-POC
nomisec NO CODE
by ivan-n0v · poc
https://github.com/ivan-n0v/cve-2024-3400
nomisec NO CODE
by hahasagined · poc
https://github.com/hahasagined/CVE-2024-3400
nomisec NO CODE
by iwallarm · poc
https://github.com/iwallarm/cve-2024-3400
gitlab SCANNER
by tdubiel1 · poc
https://gitlab.com/tdubiel1/simple-ansible-for-cve-2024-3400
nomisec SCANNER
by index2014 · remote
https://github.com/index2014/CVE-2024-3400-Checker
nomisec WORKING POC
by codeblueprint · remote
https://github.com/codeblueprint/CVE-2024-3400
nomisec WORKING POC
by Kr0ff · remote
https://github.com/Kr0ff/cve-2024-3400
nomisec WORKING POC
by andrelia-hacks · remote
https://github.com/andrelia-hacks/CVE-2024-3400
nomisec WORKING POC
by workshop748 · remote
https://github.com/workshop748/CVE-2024-3400
nomisec SCANNER
by nanwinata · remote
https://github.com/nanwinata/CVE-2024-3400
nomisec WORKING POC
by LoanVitor · poc
https://github.com/LoanVitor/CVE-2024-3400-
nomisec SUSPICIOUS
by FoxyProxys · poc
https://github.com/FoxyProxys/CVE-2024-3400
nomisec SCANNER
by terminalJunki3 · poc
https://github.com/terminalJunki3/CVE-2024-3400-Checker
nomisec WRITEUP
by CyberBibs · poc
https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400-
nomisec SCANNER
by MurrayR0123 · poc
https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker
nomisec WORKING POC
by Ravaan21 · poc
https://github.com/Ravaan21/CVE-2024-3400
nomisec WRITEUP
by Yafiah-Darwesh · poc
https://github.com/Yafiah-Darwesh/cs50-cyber-paloalto-oauth
nomisec WORKING POC
by GhassanSabir · poc
https://github.com/GhassanSabir/CVE-2024-3400-poc
nomisec WRITEUP
by CyprianAtsyor · poc
https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study
nomisec WORKING POC
by MrR0b0t19 · poc
https://github.com/MrR0b0t19/CVE-2024-3400
nomisec SCANNER
by sxyrxyy · poc
https://github.com/sxyrxyy/CVE-2024-3400-Check
nomisec WORKING POC
by tfrederick74656 · poc
https://github.com/tfrederick74656/cve-2024-3400-poc
nomisec WORKING POC
by pwnj0hn · poc
https://github.com/pwnj0hn/CVE-2024-3400
exploitdb WORKING POC
by Kr0ff · textremotelinux_x86-64
https://www.exploit-db.com/exploits/51996
metasploit WORKING POC EXCELLENT
by remmons-r7, sfewer-r7 · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_telemetry_cmd_exec.rb

Nuclei Templates (1)

GlobalProtect - OS Command Injection
CRITICALVERIFIEDby salts,parthmalhotra
Shodan: http.favicon.hash:-631559155 || http.favicon.hash:"-631559155" || cpe:"cpe:2.3:o:paloaltonetworks:pan-os"
FOFA: icon_hash="-631559155"

Scores

CVSS v3 10.0
EPSS 0.9430
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Exploitation Intel

CISA KEV 2024-04-12
VulnCheck KEV 2024-04-12
InTheWild.io 2024-04-12
ENISA EUVD EUVD-2024-31989
Ransomware Use Confirmed

Classification

CWE
CWE-20 CWE-77
Status published

Affected Products (50)

paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
paloaltonetworks/pan-os
... and 35 more

Timeline

Published Apr 12, 2024
KEV Added Apr 12, 2024
Tracked Since Feb 18, 2026