Palo Alto Networks PAN-OS Command Injection Vulnerability - 20240415001¶
Overview¶
Palo Alto Networks PAN-OS GlobalProtect contains a Zero-day command injection vulnerability that allows an unauthenticated attacker to execute commands with root privileges on the firewall.
What is vulnerable?¶
Product(s) Affected | CVE | Severity | CVSS | Exploitable |
---|---|---|---|---|
PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 | CVE-2024-3400 | Critical | 10 | Yes |
What has been observed?¶
This Zero-day has been added to the CISA Known Exploited Vulnerabilities catalog.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe (refer Patch Management):
Hot Fixes for older versions of affetced PAN-OS services will be released with the following Timeline:
PAN-OS 10.2:
- 10.2.9-h1 (Released 4/14/24)
- 10.2.8-h3 (ETA: 4/15/24)
- 10.2.7-h8 (ETA: 4/15/24)
- 10.2.6-h3 (ETA: 4/15/24)
- 10.2.5-h6 (ETA: 4/16/24)
- 10.2.3-h13 (ETA: 4/17/24)
- 10.2.1-h2 (ETA: 4/17/24)
- 10.2.2-h5 (ETA: 4/18/24)
- 10.2.0-h3 (ETA: 4/18/24)
- 10.2.4-h16 (ETA: 4/19/24)
PAN-OS 11.0:
- 11.0.4-h1 (Released 4/14/24)
- 11.0.3-h10 (ETA: 4/15/24)
- 11.0.2-h4 (ETA: 4/16/24)
- 11.0.1-h4 (ETA: 4/17/24)
- 11.0.0-h3 (ETA: 4/18/24)
PAN-OS 11.1:
- 11.1.2-h3 (Released 4/14/24)
- 11.1.1-h1 (ETA: 4/16/24)
- 11.1.0-h3 (ETA: 4/17/24)