Lucene search

K
vulnrichmentPalo_altoVULNRICHMENT:CVE-2024-3400
HistoryApr 12, 2024 - 7:20 a.m.

CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect

2024-04-1207:20:00
CWE-77
CWE-20
palo_alto
github.com
4
command injection
pan-os
globalprotect
palo alto networks
vulnerability
firewall
root privileges
cloud ngfw
panorama
prisma access
cve-2024-3400

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

8.6

Confidence

Low

EPSS

0.965

Percentile

99.6%

SSVC

Exploitation

Active

Automatable

Yes

Technical Impact

Total

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.

Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

ADP Affected

[
  {
    "cpes": [
      "cpe:2.3:o:paloaltonetworks:pan-os:10.2.0:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "affected",
        "version": "10.2.0",
        "lessThan": "10.2.9-h1 ",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:paloaltonetworks:pan-os:11.0.0:*:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "affected",
        "version": "11.0.0",
        "lessThan": "11.0.4-h1 ",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  },
  {
    "cpes": [
      "cpe:2.3:o:paloaltonetworks:pan-os:11.1.0:-:*:*:*:*:*:*"
    ],
    "vendor": "paloaltonetworks",
    "product": "pan-os",
    "versions": [
      {
        "status": "affected",
        "version": "11.1.0",
        "lessThan": "11.1.2-h3 ",
        "versionType": "custom"
      }
    ],
    "defaultStatus": "unknown"
  }
]

CVSS3

10

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

AI Score

8.6

Confidence

Low

EPSS

0.965

Percentile

99.6%

SSVC

Exploitation

Active

Automatable

Yes

Technical Impact

Total