ADVISORY!

TLP : CLEAR

Date : 19/04/2024

REF NO : CERT / 2024/04/33

Palo Alto Products Remote Code Execution Vulnerability

Severity Level: High

Components Affected

  • PAN-OS 11.1 versions earlier than 11.1.2-h3
  • PAN-OS 11.1 versions earlier than 11.1.1-h1
  • PAN-OS 11.1 versions earlier than 11.1.0-h3
  • PAN-OS 11.0 versions earlier than 11.0.4-h1
  • PAN-OS 11.0 versions earlier than 11.0.3-h10
  • PAN-OS 11.0 versions earlier than 11.0.2-h4
  • PAN-OS 10.2 versions earlier than 10.2.9-h1
  • PAN-OS 10.2 versions earlier than 10.2.8-h3
  • PAN-OS 10.2 versions earlier than 10.2.7-h8
  • PAN-OS 10.2 versions earlier than 10.2.6-h3
  • PAN-OS 10.2 versions earlier than 10.2.5-h6
  • PAN-OS 10.2 versions earlier than 10.2.4-h16
  • PAN-OS 10.2 versions earlier than 10.2.3-h13
  • PAN-OS 10.2 versions earlier than 10.2.2-h5
  • PAN-OS 10.2 versions earlier than 10.2.1-h2
  • PAN-OS 10.2 versions earlier than 10.2.0-h3

Overview

A vulnerability has been identified in Palo Alto Products. A remote attacker can exploit this vulnerability to trigger remote code execution on the targeted system.

Description

CVE-2024-3400 affected GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.

Impact

  • Remote Code Execution

Solution/ Workarounds

Before installation of the software, please visit the vendor web-site for more details.

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC