CVE-2024-3400

10.0 CRITICAL

📋 TL;DR

CVE-2024-3400 is a critical command injection vulnerability in Palo Alto Networks PAN-OS GlobalProtect feature that allows unauthenticated attackers to execute arbitrary code with root privileges. It affects specific PAN-OS versions with distinct feature configurations. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted.

💻 Affected Systems

Products:
  • Palo Alto Networks PAN-OS
Versions: PAN-OS 10.2, 11.0, and 11.1 with specific configurations
Operating Systems: PAN-OS (custom OS)
Default Config Vulnerable: ✅ No
Notes: Only affects firewalls with both GlobalProtect gateway and device telemetry enabled. Cloud NGFW, Panorama, and Prisma Access are NOT affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of firewall with root access, enabling lateral movement, data exfiltration, and persistent backdoor installation.

🟠

Likely Case

Remote code execution leading to firewall compromise, credential theft, and network pivoting.

🟢

If Mitigated

Limited impact if proper network segmentation and access controls prevent exploitation attempts.

🌐 Internet-Facing: HIGH - Unauthenticated exploit against internet-facing GlobalProtect gateways makes this extremely dangerous.
🏢 Internal Only: MEDIUM - Still significant risk if internal attackers or compromised systems can reach affected firewalls.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Actively exploited in the wild as a zero-day. Multiple threat actors have weaponized this vulnerability.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: PAN-OS 10.2.9-h1, 11.0.4-h1, 11.1.2-h3, and later versions

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-3400

Restart Required: Yes

Instructions:

1. Download appropriate hotfix from Palo Alto support portal. 2. Upload to firewall. 3. Install hotfix. 4. Reboot firewall. 5. Verify patch installation.

🔧 Temporary Workarounds

Disable Device Telemetry

all

Temporarily disable device telemetry to prevent exploitation until patching can be completed.

set deviceconfig setting telemetry disabled

🧯 If You Can't Patch

  • Immediately disable device telemetry on affected firewalls.
  • Implement strict network access controls to limit exposure to GlobalProtect gateways.

🔍 How to Verify

Check if Vulnerable:

Check PAN-OS version and verify if GlobalProtect gateway and device telemetry are both enabled.

Check Version:

show system info

Verify Fix Applied:

Verify PAN-OS version is patched to recommended hotfix version and device telemetry status.

📡 Detection & Monitoring

Log Indicators:

  • Unusual file creation in /var directory
  • Suspicious command execution logs
  • Anomalous GlobalProtect authentication patterns

Network Indicators:

  • Unexpected outbound connections from firewall
  • Suspicious HTTP requests to GlobalProtect endpoints

SIEM Query:

source="pan_logs" AND (event_type="file" AND file_path="/var/*") OR (event_type="command" AND command="*sh*")

🔗 References

📤 Share & Export