10

CVE-2024-3400

Warnung
Exploit

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.

Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
PaloaltonetworksPan-os Version10.2.0 Update-
PaloaltonetworksPan-os Version10.2.0 Updateh1
PaloaltonetworksPan-os Version10.2.0 Updateh2
PaloaltonetworksPan-os Version10.2.1 Update-
PaloaltonetworksPan-os Version10.2.1 Updateh1
PaloaltonetworksPan-os Version10.2.2 Update-
PaloaltonetworksPan-os Version10.2.2 Updateh1
PaloaltonetworksPan-os Version10.2.2 Updateh2
PaloaltonetworksPan-os Version10.2.2 Updateh4
PaloaltonetworksPan-os Version10.2.3 Update-
PaloaltonetworksPan-os Version10.2.3 Updateh11
PaloaltonetworksPan-os Version10.2.3 Updateh12
PaloaltonetworksPan-os Version10.2.3 Updateh2
PaloaltonetworksPan-os Version10.2.3 Updateh4
PaloaltonetworksPan-os Version10.2.3 Updateh9
PaloaltonetworksPan-os Version10.2.4 Update-
PaloaltonetworksPan-os Version10.2.4 Updateh10
PaloaltonetworksPan-os Version10.2.4 Updateh2
PaloaltonetworksPan-os Version10.2.4 Updateh3
PaloaltonetworksPan-os Version10.2.4 Updateh4
PaloaltonetworksPan-os Version10.2.5 Update-
PaloaltonetworksPan-os Version10.2.5 Updateh1
PaloaltonetworksPan-os Version10.2.5 Updateh4
PaloaltonetworksPan-os Version10.2.6 Update-
PaloaltonetworksPan-os Version10.2.6 Updateh1
PaloaltonetworksPan-os Version10.2.7 Update-
PaloaltonetworksPan-os Version10.2.7 Updateh1
PaloaltonetworksPan-os Version10.2.7 Updateh3
PaloaltonetworksPan-os Version10.2.7 Updateh6
PaloaltonetworksPan-os Version10.2.8 Update-
PaloaltonetworksPan-os Version10.2.9 Update-
PaloaltonetworksPan-os Version11.0.0 Update-
PaloaltonetworksPan-os Version11.0.0 Updateh1
PaloaltonetworksPan-os Version11.0.0 Updateh2
PaloaltonetworksPan-os Version11.0.1 Update-
PaloaltonetworksPan-os Version11.0.1 Updateh2
PaloaltonetworksPan-os Version11.0.1 Updateh3
PaloaltonetworksPan-os Version11.0.2 Update-
PaloaltonetworksPan-os Version11.0.2 Updateh1
PaloaltonetworksPan-os Version11.0.2 Updateh2
PaloaltonetworksPan-os Version11.0.2 Updateh3
PaloaltonetworksPan-os Version11.0.3 Update-
PaloaltonetworksPan-os Version11.0.3 Updateh1
PaloaltonetworksPan-os Version11.0.3 Updateh3
PaloaltonetworksPan-os Version11.0.3 Updateh5
PaloaltonetworksPan-os Version11.0.4 Update-
PaloaltonetworksPan-os Version11.1.0 Update-
PaloaltonetworksPan-os Version11.1.0 Updateh1
PaloaltonetworksPan-os Version11.1.0 Updateh2
PaloaltonetworksPan-os Version11.1.1 Update-
PaloaltonetworksPan-os Version11.1.2 Update-
PaloaltonetworksPan-os Version11.1.2 Updateh1

12.04.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

Palo Alto Networks PAN-OS Command Injection Vulnerability

Schwachstelle

Palo Alto Networks PAN-OS GlobalProtect feature contains a command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.

Beschreibung

Apply mitigations per vendor instructions as they become available. Otherwise, users with vulnerable versions of affected devices should enable Threat Prevention IDs available from the vendor. See the vendor bulletin for more details and a patch release schedule.

Erforderliche Maßnahmen
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 94.3% 0.999
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 10 3.9 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
psirt@paloaltonetworks.com 10 3.9 6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
CWE-20 Improper Input Validation

The product receives input or data, but it does not validate or incorrectly validates that the input has the properties that are required to process the data safely and correctly.

CWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')

The product constructs all or part of a command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended command when it is sent to a downstream component.