CVE-2024-3400
CVSS V2 None
CVSS V3 None
Description
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.
Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Overview
- CVE ID
- CVE-2024-3400
- Assigner
- palo_alto
- Vulnerability Status
- PUBLISHED
- Published Version
- 2024-04-12T07:20:00.707Z
- Last Modified Date
- 2024-06-04T17:31:26.144Z
Weakness Enumerations
References
Reference URL | Reference Tags |
---|---|
https://security.paloaltonetworks.com/CVE-2024-3400 | vendor-advisory |
https://unit42.paloaltonetworks.com/cve-2024-3400/ | technical-description |
https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/ | technical-description |
https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/ | technical-description |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2024-3400 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-3400 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2024-06-23 23:26:53 | Added to TrackCVE |