CVE-2024-3400
PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- April 05, 2024
- Published Date
- April 12, 2024
- Last Updated
- August 01, 2024
- Vendor
- Palo Alto Networks
- Product
- PAN-OS, Cloud NGFW, Prisma Access
- Description
- A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
SSVC Information
- Exploitation
- Active
- Automatable
- Yes
- Technical Impact
- Total
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-04-12 00:00:00 UTC |
Recent Mentions
Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help
Source: Tenable Blog • Published: 2025-04-25 19:58:48 UTC
Verizon 2025 DBIR: Tenable Research Collaboration Shines a Spotlight on CVE Remediation Trends
Source: Tenable Blog • Published: 2025-04-23 04:05:00 UTC
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Metasploit | https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_telemetry_cmd_exec.rb | 2025-04-29 11:01:14 UTC |
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-3400.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
panos_telemetry_cmd_exec
Type: metasploit • Created: Unknown
XiaomingX/CVE-2024-3400-poc
Type: github • Created: 2025-01-10 02:20:26 UTC • Stars: 8
marconesler/CVE-2024-3400
Type: github • Created: 2024-04-27 18:58:41 UTC • Stars: 2
0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection
Type: github • Created: 2024-04-25 10:23:03 UTC • Stars: 4
zam89/CVE-2024-3400-pot
Type: github • Created: 2024-04-24 14:21:26 UTC • Stars: 6
swaybs/CVE-2024-3400
Type: github • Created: 2024-04-18 16:45:51 UTC • Stars: 2
schooldropout1337/CVE-2024-3400
Type: github • Created: 2024-04-18 10:16:22 UTC • Stars: 5
retkoussa/CVE-2024-3400
Type: github • Created: 2024-04-17 22:28:10 UTC • Stars: 2
ak1t4/CVE-2024-3400
Type: github • Created: 2024-04-17 16:01:20 UTC • Stars: 9
ZephrFish/CVE-2024-3400-Canary
Type: github • Created: 2024-04-17 11:41:01 UTC • Stars: 2
ihebski/CVE-2024-3400
Type: github • Created: 2024-04-16 21:24:15 UTC • Stars: 27
Chocapikk/CVE-2024-3400
Type: github • Created: 2024-04-16 21:21:41 UTC • Stars: 13
W01fh4cker/CVE-2024-3400-RCE-Scan
Type: github • Created: 2024-04-16 16:18:56 UTC • Stars: 87
h4x0r-dz/CVE-2024-3400
Type: github • Created: 2024-04-16 14:18:08 UTC • Stars: 157
AdaniKamal/CVE-2024-3400
Type: github • Created: 2024-04-16 01:43:24 UTC • Stars: 7
momika233/CVE-2024-3400
Type: github • Created: 2024-04-14 15:16:16 UTC • Stars: 13
0x0d3ad/CVE-2024-3400
Type: github • Created: 2024-04-13 14:00:31 UTC • Stars: 72
CerTusHack/CVE-2024-3400-PoC
Type: github • Created: 2024-04-13 11:55:53 UTC • Stars: 2
Yuvvi01/CVE-2024-3400
Type: github • Created: 2024-04-13 05:16:21 UTC • Stars: 9