Loading HuntDB...

CVE-2024-3400

CRITICAL
Published 2024-04-12T07:20:00.707Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2024-3400. We'll provide specific mitigation strategies based on your environment and risk profile.

CVSS Score

V3.1
10.0
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A Impact: N/A

EPSS Score

v2025.03.14
0.943
probability
of exploitation in the wild

There is a 94.3% chance that this vulnerability will be exploited in the wild within the next 30 days.

Updated: 2025-06-25
Exploit Probability
Percentile: 0.999
Higher than 99.9% of all CVEs

Attack Vector Metrics

Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
CHANGED

Impact Metrics

Confidentiality
HIGH
Integrity
HIGH
Availability
HIGH

Description

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.

Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Available Exploits

GlobalProtect - OS Command Injection

A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

ID: CVE-2024-3400
Author: saltsparthmalhotra Critical

Related News

No news articles found for this CVE.

Affected Products

Known Exploited Vulnerability

This vulnerability is actively being exploited in the wild

View KEV Details

Remediation Status

Overdue

Due Date

April 19, 2024

Added to KEV

April 12, 2024

Required Action

Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule.

Affected Product

Vendor/Project: Palo Alto Networks
Product: PAN-OS

Ransomware Risk

Known Ransomware Use
KEV Catalog Version: 2025.01.24 Released: January 24, 2025

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed CRITICAL

GHSA-v475-xhc9-wfxg

Advisory Details

A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Fixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. All other versions of PAN-OS are also not impacted.

CVSS Scoring

CVSS Score

9.0

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Advisory provided by GitHub Security Advisory Database. Published: April 12, 2024, Modified: April 20, 2024

Social Media Intelligence

Real-time discussions and threat intelligence from social platforms

4 posts
Reddit 1 week, 4 days ago
Electrical_Hat_680

🔐 Salt Typhoon Protocol: A Quantum-Resilient Hash-Based Defense Grid for Critical Infrastructure (CISA/NSA Briefing) 🔐 Salt Typhoon Protocol: A Quantum-Resilient Hash-Based Defense Grid for Critical Infrastructure (CISA/NSA Briefing) --- 🧠 Executive Summary Salt Typhoon is not just a threat—it’s a blueprint for a new kind of cyber warfare. I propose …

Also mentions: CVE-2023-20198
Reddit 1 week, 4 days ago
Electrical_Hat_680

🔐 Salt Typhoon Protocol: A Quantum-Resilient Hash-Based Defense Grid for Critical Infrastructure (CISA/NSA Briefing) --- 🔐 Salt Typhoon Protocol: A Quantum-Resilient Hash-Based Defense Grid for Critical Infrastructure (CISA/NSA Briefing) --- 🧠 Executive Summary Salt Typhoon is not just a threat—it’s a blueprint for a new kind of cyber warfare. I …

Also mentions: CVE-2023-20198
Reddit 1 week, 4 days ago
fruderduck
Exploit

Salt Typhoon Security Hack https://www.forbes.com/sites/emilsayegh/2025/08/30/us-and-allies-declare-salt-typhoon-hack-a-national-defense-crisis/ The FBI and allied international intelligence agencies have declared the Salt Typhoon cyber campaign a national defense crisis after uncovering widespread infiltration of global telecommunications networks by Chinese state-backed hackers. In one of the most sweeping espionage operations ever exposed, Salt Typhoon actors compromised the …

488
55
598.0
View Original High Risk
Reddit 2 weeks ago
technadu
Exploit

CISA Issues Global Warning on Chinese State-Sponsored Espionage Campaign A coalition of cybersecurity agencies (U.S., U.K., AU, CA, NZ) has released **Advisory AA25-239A**, detailing a **major cyber espionage operation** attributed to **Chinese state-sponsored actors**. 📌 Key details: * Target sectors: **Telecom, government, transportation**. * Countries affected: U.S., U.K., Australia, Canada, …

2
3
8.0
View Original High Risk

References

Published: 2024-04-12T07:20:00.707Z
Last Modified: 2025-07-28T19:43:22.839Z
Copied to clipboard!