CVE-2024-3400
Severity CVSS v4.0:
Pending analysis
Type:
CWE-20
Input Validation
Publication date:
12/04/2024
Last modified:
29/11/2024
Description
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.<br />
<br />
Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Impact
Base Score 3.x
10.00
Severity 3.x
CRITICAL
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:-:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h1:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:h2:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:-:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.1:h1:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:-:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h1:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h2:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.2:h4:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:-:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h11:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h12:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h2:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h4:*:*:*:*:*:* | ||
cpe:2.3:o:paloaltonetworks:pan-os:10.2.3:h9:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- https://security.paloaltonetworks.com/CVE-2024-3400
- https://unit42.paloaltonetworks.com/cve-2024-3400/
- https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/
- https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/
- https://security.paloaltonetworks.com/CVE-2024-3400
- https://unit42.paloaltonetworks.com/cve-2024-3400/
- https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/
- https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/