Skip to content

Commit

Permalink
Palo Alto Networks PAN-OS Command Injection Vulnerability added to CI…
Browse files Browse the repository at this point in the history
…SA Known Exploited Catalog - 20240415001
  • Loading branch information
LSerki authored Apr 15, 2024
1 parent a306442 commit 7baaae6
Showing 1 changed file with 33 additions and 35 deletions.
Original file line number Diff line number Diff line change
@@ -1,35 +1,33 @@
# Palo Alto Networks PAN-OS Command Injection Vulnerability added to CISA Known Exploited Catalog - 20240415001

## Overview

Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.

## What is vulnerable?

| Product(s) Affected | CVE | Severity | CVSS |
| ----------------------------------------------------- | --------------------------------------------------------------- | ------------ | ---- |
| **PAN-OS 10.2**, **PAN-OS 11.0**, and **PAN-OS 11.1** | [CVE-2024-3400](https://nvd.nist.gov/vuln/detail/CVE-2024-3400) | **Critical** | 10 |

## What has been observed?

CISA added this vulnerability in their [Known Exploited Vulnerabilities](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) catalog.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)):

- [Palo Alto Networks Security Advisories-CVE-2024-3400](https://security.paloaltonetworks.com/CVE-2024-3400)

- [PAN-OS 11.0.4-h1 Addressed Issues (paloaltonetworks.com)](https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes/pan-os-11-0-4-known-and-addressed-issues/pan-os-11-0-4-h1-addressed-issues "https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes/pan-os-11-0-4-known-and-addressed-issues/pan-os-11-0-4-h1-addressed-issues")

- [PAN-OS 11.1.2-h3 Addressed Issues (paloaltonetworks.com)](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-2-known-and-addressed-issues/pan-os-11-1-2-h3-addressed-issues "https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-2-known-and-addressed-issues/pan-os-11-1-2-h3-addressed-issues")

- [PAN-OS 10.2.9-h1 Addressed Issues (paloaltonetworks.com)](https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-9-known-and-addressed-issues/pan-os-10-2-9-h1-addressed-issues "https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-9-known-and-addressed-issues/pan-os-10-2-9-h1-addressed-issues")

### Additional Resources

- [Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)

- [Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400](https://unit42.paloaltonetworks.com/cve-2024-3400/ "https://unit42.paloaltonetworks.com/cve-2024-3400/")

- [Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)](https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/ "https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/")
# Palo Alto Networks PAN-OS Command Injection Vulnerability added to CISA Known Exploited Catalog - 20240415001

## Overview

Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.

## What is vulnerable?

| Product(s) Affected | CVE | Severity | CVSS |
| ---------------------- | ------------------------------------------------------------------------------- | -------------------------------- | ---- |
| **PAN-OS 10.2**, **PAN-OS 11.0**, and **PAN-OS 11.1** | [CVE-2024-3400](https://nvd.nist.gov/vuln/detail/CVE-2024-3400) | **Critical** | 10 |

## What has been observed?

CISA added this vulnerability in their [Known Exploited Vulnerabilities](https://www.cisa.gov/known-exploited-vulnerabilities-catalog) catalog.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer [Patch Management](../guidelines/patch-management.md)):

- [Palo Alto Networks Security Advisories-CVE-2024-3400](https://security.paloaltonetworks.com/CVE-2024-3400)
- [PAN-OS 11.0.4-h1 Addressed Issues (paloaltonetworks.com)](https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes/pan-os-11-0-4-known-and-addressed-issues/pan-os-11-0-4-h1-addressed-issues "https://docs.paloaltonetworks.com/pan-os/11-0/pan-os-release-notes/pan-os-11-0-4-known-and-addressed-issues/pan-os-11-0-4-h1-addressed-issues")

- [PAN-OS 11.1.2-h3 Addressed Issues (paloaltonetworks.com)](https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-2-known-and-addressed-issues/pan-os-11-1-2-h3-addressed-issues "https://docs.paloaltonetworks.com/pan-os/11-1/pan-os-release-notes/pan-os-11-1-2-known-and-addressed-issues/pan-os-11-1-2-h3-addressed-issues")

- [PAN-OS 10.2.9-h1 Addressed Issues (paloaltonetworks.com)](https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-9-known-and-addressed-issues/pan-os-10-2-9-h1-addressed-issues "https://docs.paloaltonetworks.com/pan-os/10-2/pan-os-release-notes/pan-os-10-2-9-known-and-addressed-issues/pan-os-10-2-9-h1-addressed-issues")

### Additional Resources

- [Known Exploited Vulnerabilities Catalog](https://www.cisa.gov/known-exploited-vulnerabilities-catalog)
- [Threat Brief: Operation MidnightEclipse, Post-Exploitation Activity Related to CVE-2024-3400](https://unit42.paloaltonetworks.com/cve-2024-3400/ "https://unit42.paloaltonetworks.com/cve-2024-3400/")

- [Zero-Day Exploitation of Unauthenticated Remote Code Execution Vulnerability in GlobalProtect (CVE-2024-3400)](https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/ "https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/")

0 comments on commit 7baaae6

Please sign in to comment.