Lucene search

K
paloaltoPalo Alto Networks Product Security Incident Response TeamPA-CVE-2024-3400
HistoryApr 12, 2024 - 6:55 a.m.

PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

2024-04-1206:55:00
Palo Alto Networks Product Security Incident Response Team
securityadvisories.paloaltonetworks.com
123
pan-os
command injection
globalprotect
vulnerability
palo alto networks
fix
threat prevention
mitigation
device telemetry

9.9 High

AI Score

Confidence

High

0.954 High

EPSS

Percentile

99.4%

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.

Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Customers should continue to monitor this security advisory for the latest updates and product guidance.

Work around:
Recommended Mitigation: Customers with a Threat Prevention subscription can block attacks for this vulnerability using Threat IDs 95187, 95189, and 95191 (available in Applications and Threats content version 8836-8695 and later). Please monitor this advisory and new Threat Prevention content updates for additional Threat Prevention IDs around CVE-2024-3400.

To apply the Threat IDs, customers must ensure that vulnerability protection has been applied to their GlobalProtect interface to prevent exploitation of this issue on their device. Please see https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184 for more information.

In earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.