1 min read

CVE-2024-3400: Palo Alto Networks PAN-OS Zero-Day Under Active Exploitation

CVE-2024-3400: Palo Alto Networks PAN-OS Zero-Day Under Active Exploitation

Palo Alto Networks released a security bulletin detailing a new critical command injection vulnerability in their PAN-OS software, tracked as CVE-2024-3400 which carries a maximum CVSS score of 10.0.

According to the advisory, this vulnerability has been under active exploitation. Successful exploitation of this flaw allows for a threat actor to execute arbitrary code with root privileges on the device.

Which Versions are Affected?

The vulnerability only affects certain versions of PAN-OS when both GlobalProtect gateway and device telemetry are enabled. Affected versions are:

  • PAN-OS 10.2.9-h1 and prior
  • PAN-OS 11.0.4-h1 and prior
  • PAN-OS 11.1.2-h3 and prior

Per the Palo Alto advisory, administrators can verify if the GlobalProtect gateway is configured by checking in the firewall web interface (Network > GlobalProtect > Gateways).

Device telemetry features can also be verified in the web interface (Device > Setup > Telemetry).

How to Protect Your Organization

Per the Palo Alto advisory, a patch for this vulnerability will be available by Sunday 4/14/24. Administrators are urged to apply this patch as soon as it becomes available.

There are several mitigation steps that can be taken in the interim. Palo Alto customers with the Threat Prevention subscription enabled can block attacks for the vulnerability by enabling Threat ID 95187.

Additionally, those customers must ensure vulnerability protection has been applied to their GlobalProtect interface to prevent exploitation on their device. Additional information for this can be found here.

For customers that do not have the Threat Prevention subscription, administrators can temporarily disable device telemetry until the device gets the appropriate patch. Details for how to disable device telemetry can be found here.


DISCLAIMER

Kindly be advised that the information contained in this article is presented with no final evaluation and should be considered raw data. The sole purpose of this information is to provide situational awareness based on the currently available knowledge. We recommend exercising caution and conducting further research as necessary before making any decisions based on this information.

Cyber Threat Intelligence Report

23 min read

Cyber Threat Intelligence Report

This week, we briefed our clients on Anthropic's announcement of Claude Mythos Preview and its alleged ability to discover and exploit...

Read More
Cyber Threat Intelligence Report

17 min read

Cyber Threat Intelligence Report

This week, we briefed our clients on recent supply chain attacks to raise awareness and help organizations identify whether they have been attacked.

Read More
Cyber Threat Intelligence Report

16 min read

Cyber Threat Intelligence Report

This week, we briefed our clients on the findings from Google's 2025 ransomware investigations. We highlighted the key TTPs used by ransomware...

Read More
Future Team Sixty43 Reports.
Be notified when Cyber Threat Intelligence or Threat Profile reports are published.