What is it?

GlobalProtect, a feature of the Palo Alto networks PAN-OS, allows remote users to access local and Internet resources.

A weakness in the software allows an attacker to create arbitrary files and inject arbitrary commands.

This issue is applicable to PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portal (or both). Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.

Why is it a risk?

The risks should be obvious; an attacker can take complete control of your network!

This threat is currently being exploited on the Internet.

The Common Vulnerability Scoring System (CVSS) assigns this threat a score of 10/Critical, the highest score possible.

The link to the paloalto networks website below provides more details about this threat.

How can you mitigate the risk?

You must upgrade your PAN-OS installation.

This issue is fixed in PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. Customers who upgrade to these versions will be fully protected.

Resources:

paloalto networks CVE-2024-3400

https://security.paloaltonetworks.com/CVE-2024-3400

Share →