CVE-2024-3400

CRITICAL
2024-04-12 [email protected]
10.0
CVSS 3.1
Share

CVSS Vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High

Lifecycle Timeline

4
Analysis Generated
Mar 26, 2026 - 11:20 vuln.today
Added to CISA KEV
Nov 04, 2025 - 16:49 cisa
CISA KEV
PoC Detected
Nov 04, 2025 - 16:49 vuln.today
Public exploit code
CVE Published
Apr 12, 2024 - 08:15 nvd
CRITICAL 10.0

Description

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Analysis

Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection via arbitrary file creation (CVSS 10.0) allowing unauthenticated root-level RCE, triggering an emergency patching directive from CISA in April 2024.

Technical Context

The CWE-20 vulnerability allows unauthenticated attackers to create arbitrary files on the firewall through the GlobalProtect portal/gateway. The file creation capability is leveraged for command injection, achieving root-level code execution on the PAN-OS device.

Affected Products

['Palo Alto Networks PAN-OS with GlobalProtect enabled (specific versions)']

Remediation

Apply PAN-OS hotfixes immediately. Disable GlobalProtect portal/gateway if not critical. Check for IoCs including suspicious cron jobs and modified configurations. Rotate all credentials accessible from the firewall.

Priority Score

224
Low Medium High Critical
KEV: +50
EPSS: +94.3
CVSS: +50
POC: +20

Share

CVE-2024-3400 vulnerability details – vuln.today

This site uses cookies essential for authentication and security. No tracking or analytics cookies are used. Privacy Policy