Vulnerability Details CVE-2024-3400
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.
Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.943
EPSS Ranking 99.9%
CVSS Severity
CVSS v3 Score 10.0
Proposed Action
Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.
Ransomware Campaign
Known
Products affected by CVE-2024-3400
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.0
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.1
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.2
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.3
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.4
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.5
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.6
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.7
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.8
-
cpe:2.3:o:paloaltonetworks:pan-os:10.2.9
-
cpe:2.3:o:paloaltonetworks:pan-os:11.0.0
-
cpe:2.3:o:paloaltonetworks:pan-os:11.0.1
-
cpe:2.3:o:paloaltonetworks:pan-os:11.0.2
-
cpe:2.3:o:paloaltonetworks:pan-os:11.0.3
-
cpe:2.3:o:paloaltonetworks:pan-os:11.0.4
-
cpe:2.3:o:paloaltonetworks:pan-os:11.1.0
-
cpe:2.3:o:paloaltonetworks:pan-os:11.1.1
-
cpe:2.3:o:paloaltonetworks:pan-os:11.1.2