Логотип exploitDog
bind:CVE-2024-3400
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-3400

Количество 3

Количество 3

nvd логотип

CVE-2024-3400

почти 2 года назад

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

CVSS3: 10
EPSS: Критический
github логотип

GHSA-v475-xhc9-wfxg

почти 2 года назад

A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Fixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. All other versions of PAN-OS are also not impacted.

CVSS3: 9.8
EPSS: Критический
fstec логотип

BDU:2024-02881

почти 2 года назад

Уязвимость функции GlobalProtect операционной системы PAN-OS, позволяющая нарушителю выполнить произвольный код с root-привилегиями

CVSS3: 10
EPSS: Критический

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-3400

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

CVSS3: 10
94%
Критический
почти 2 года назад
github логотип
GHSA-v475-xhc9-wfxg

A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Fixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. All other versions of PAN-OS are also not impacted.

CVSS3: 9.8
94%
Критический
почти 2 года назад
fstec логотип
BDU:2024-02881

Уязвимость функции GlobalProtect операционной системы PAN-OS, позволяющая нарушителю выполнить произвольный код с root-привилегиями

CVSS3: 10
94%
Критический
почти 2 года назад

Уязвимостей на страницу