• Platformchevron right
  • Solutionschevron right
  • Modern NDRchevron right
  • Resourceschevron right
  • Companychevron right

DETECTION OVERVIEW

Palo Alto Networks PAN-OS Command Injection Attempt - CVE-2024-3400

Risk Factors

Palo Alto Networks PAN-OS devices with the GlobalProtect VPN feature include vulnerabilities that have been exploited by threat actors. Exploit code is publicly available, which makes the process of exploiting chained vulnerabilities easier for the attacker. An unauthenticated attacker can run arbitrary code with root privileges to gain control of a PAN-OS device and launch additional attacks on the network.

Kill Chain

Exploitation

Risk Score

87

Next in Exploitation: Palo Alto Networks PAN-OS File Creation - CVE-2024-3400

Attack Background

The GlobalProtect VPN feature of Palo Alto Networks PAN-OS has a command injection vulnerability (CVE-2024-3400) that leads to remote code execution (RCE). An unauthenticated attacker sends a specially designed HTTP request that contains a malicious shell command instead of a valid SESSID cookie to the GlobalProtect web server. As a result, the GlobalProtect web server creates an empty file on the system with a malicious command as the filename. When device telemetry is enabled, a regularly scheduled system job runs the malicious command with root privileges, which enables the attacker to gain control of the device.

Mitigation Options

Upgrade to PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3 or later PAN-OS versions

MITRE ATT&CK ID

What else can RevealX do for you?