CVE-2024-3400 (+ url + github url#1, url#2) is a critical command injection vulnerability in Palo Alto Networks' PAN-OS software, specifically affecting the GlobalProtect feature. This vulnerability allows an unauthenticated, remote attacker to execute arbitrary code with root privileges on the affected firewall. The vulnerability impacts PAN-OS versions 10.2, 11.0, and 11.1 when configured with GlobalProtect gateway or GlobalProtect portal. Initial Discovery and Exploitation: 📌The vulnerability was first identified by Volexity, who observed zero-day exploitation attempts on March 26, 2024. 📌Attackers, identified as the state-backed group UTA0218, exploited the vulnerability to gain unauthorized access to firewall devices. Attack Vector: 📌The vulnerability is exploited via a command injection flaw in the GlobalProtect feature. Attackers can manipulate the SESSID cookie to create arbitrary files on the system, which can then be used to execute commands with root privileges. 📌The att
Root Privileges for Dummies: Just Exploit CVE-2024-3400
17 июля 202417 июл 2024
2 мин