CVE-2024-3400

PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

Basic Information

CVE State
PUBLISHED
Reserved Date
April 05, 2024
Published Date
April 12, 2024
Last Updated
August 01, 2024
Vendor
Palo Alto Networks
Product
PAN-OS, Cloud NGFW, Prisma Access
Description
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

CVSS Scores

CVSS v3.1

10.0 - CRITICAL

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

SSVC Information

Exploitation
Active
Automatable
Yes
Technical Impact
Total

Exploit Status

Exploited in the Wild
Yes (added 2024-04-12 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2024-04-13 11:55:53 UTC) Source
Used in Malware
Yes (added 2024-04-12 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2024-04-12 00:00:00 UTC

Recent Mentions

Reducing Remediation Time Remains a Challenge: How Tenable Vulnerability Watch Can Help

Source: Tenable Blog • Published: 2025-04-25 19:58:48 UTC

Timely vulnerability remediation is an ongoing challenge for organizations as they struggle to prioritize the exposures that represent the greatest risk to their operations. Existing scoring systems are invaluable but can lack context. Here’s how Tenable’s Vulnerability Watch classification system can help.BackgroundOver the past six years working in Tenable’s research organization, I’ve watched known vulnerabilities and zero-day flaws plague organizations in the immediate aftermath of disclosure or even years afterwards. Following each blog post or threat report we’ve published, I kept coming back to the same question: Why are so many organizations struggling to remediate vulnerabilities in a timely manner?As someone who followed the evolution of COVID-19 variants throughout the beginning of the pandemic, I saw that the World Health Organization (WHO) began to label new variants under a classification system as the virus began to mutate. This classification system was designed to help prioritization efforts for monitoring and research. It included accessible labels like variants of interest and variants of concern to help communicate urgency and focus global attention.I began to wonder: What if we borrowed from the same type of classification system used by the WHO and applied it to vulnerability intelligence? Numeric-based systems like the Common Vulnerability Scoring System (CVSS) and Exploit Prediction Scoring System (EPSS) provide mechanisms for prioritization based on scoring. However, they don’t always provide enough context to help decision makers. So, what if we used simple, clear and status-based terminology to communicate risks surrounding vulnerabilities in order to guide action?This led us to develop Vulnerability Watch, a classification system for vulnerabilities inspired by the WHO’s classification of COVID-19 variants. Vulnerability Watch is a small, but important part of Tenable’s Vulnerability Intelligence offering that was launched in 2024....
The 2025 Verizon Data Breach Investigations Report (DBIR) reveals that vulnerability exploitation was present in 20% of breaches — a 34% increase year-over-year. To support the report, Tenable Research contributed enriched data on the most exploited vulnerabilities. In this blog, we analyze 17 edge-related CVEs and remediation trends across industry sectors.BackgroundSince 2008, Verizon’s annual Data Breach Investigations Report (DBIR) has helped organizations understand evolving cyber threats. For the 2025 edition, Tenable Research contributed enriched data on the most exploited vulnerabilities of the past year. We analyzed over 160 million data points and zeroed-in on the 17 edge device CVEs featured in the DBIR to understand their average remediation times. In this blog, we take a closer look at these vulnerabilities, revealing industry-specific trends and highlighting where patching still lags — often by months.In this year’s DBIR, vulnerabilities in Virtual Private Networks (VPNs) and edge devices were particular areas of concern, accounting for 22% of the CVE-related breaches in this year’s report, almost eight times the amount of 3% found in the 2024 report.AnalysisThe 2025 DBIR found that exploitation of vulnerabilities surged to be one of the top initial access vectors for 20% of data breaches. This represents a 34% increase over last year’s report and is driven in part by the zero-day exploitation of VPN and edge device vulnerabilities – asset classes that traditional endpoint detection and response (EDR) vendors struggle to assess effectively. The DBIR calls special attention to 17 CVEs affecting these edge devices, which remain valuable targets for attackers. Tenable Research analyzed these 17 CVEs and evaluated which industries had the best and worst remediation rates across the vulnerabilities. As a primer, the table below provides this list of CVEs and details for each, including their Common Vulnerability Scoring System (CVSS) and Tenable...

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

panos_telemetry_cmd_exec

Type: metasploit • Created: Unknown

Metasploit module for CVE-2024-3400

XiaomingX/CVE-2024-3400-poc

Type: github • Created: 2025-01-10 02:20:26 UTC • Stars: 8

CVE-2024-3400的攻击脚本

marconesler/CVE-2024-3400

Type: github • Created: 2024-04-27 18:58:41 UTC • Stars: 2

Exploit for GlobalProtect CVE-2024-3400

0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection

Type: github • Created: 2024-04-25 10:23:03 UTC • Stars: 4

zam89/CVE-2024-3400-pot

Type: github • Created: 2024-04-24 14:21:26 UTC • Stars: 6

Simple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability

swaybs/CVE-2024-3400

Type: github • Created: 2024-04-18 16:45:51 UTC • Stars: 2

Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts

schooldropout1337/CVE-2024-3400

Type: github • Created: 2024-04-18 10:16:22 UTC • Stars: 5

retkoussa/CVE-2024-3400

Type: github • Created: 2024-04-17 22:28:10 UTC • Stars: 2

CVE-2024-3400 : Palo Alto OS Command Injection - POC

ak1t4/CVE-2024-3400

Type: github • Created: 2024-04-17 16:01:20 UTC • Stars: 9

Global Protec Palo Alto File Write Exploit

ZephrFish/CVE-2024-3400-Canary

Type: github • Created: 2024-04-17 11:41:01 UTC • Stars: 2

Have we not learnt from HoneyPoC?

ihebski/CVE-2024-3400

Type: github • Created: 2024-04-16 21:24:15 UTC • Stars: 27

CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect

Chocapikk/CVE-2024-3400

Type: github • Created: 2024-04-16 21:21:41 UTC • Stars: 13

W01fh4cker/CVE-2024-3400-RCE-Scan

Type: github • Created: 2024-04-16 16:18:56 UTC • Stars: 87

CVE-2024-3400-RCE

h4x0r-dz/CVE-2024-3400

Type: github • Created: 2024-04-16 14:18:08 UTC • Stars: 157

CVE-2024-3400 Palo Alto OS Command Injection

AdaniKamal/CVE-2024-3400

Type: github • Created: 2024-04-16 01:43:24 UTC • Stars: 7

CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect

momika233/CVE-2024-3400

Type: github • Created: 2024-04-14 15:16:16 UTC • Stars: 13

0x0d3ad/CVE-2024-3400

Type: github • Created: 2024-04-13 14:00:31 UTC • Stars: 72

CVE-2024-3400

CerTusHack/CVE-2024-3400-PoC

Type: github • Created: 2024-04-13 11:55:53 UTC • Stars: 2

Yuvvi01/CVE-2024-3400

Type: github • Created: 2024-04-13 05:16:21 UTC • Stars: 9