2024-04-15
Critical RCE Vulnerability in Palo Alto Networks GlobalProtect
Palo Alto Networks has released hotfixes to address a critical command injection vulnerability in multiple versions of their PAN-OS software. Palo Alto Networks was alerted to the vulnerability by researchers from Volexity. The flaw is being actively exploited to place Python backdoors on vulnerable devices. According to Palo Alto Networks, the flaw affects PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portal (or both) and device telemetry enabled.
Editor's Note
"Must patch" should be obvious for this vulnerability. Palo Alto Networks released guidance with workarounds, and patches, this weekend. But also do not forget to check for compromise. There is no widely available exploit at this time, but we have seen reports of scans for vulnerable devices over the weekend. Whoever has the exploit will likely try to make good use of it as fast as possible.

Johannes Ullrich
CVE-2024-3400, PAN-OS command injection vulnerability in GlobalProtect has a CVSS score of 10.0 and is in the NIST KEV catalog with a remediation due date of April 19th. Apply the hotfix, or Threat ID 95817 to mitigate. If you're still running PAN-OS 9 or 10.1, you're not affected; however, you need to delve into why you're not on the current PAN-OS. In addition to making sure your more important systems, such as boundary control devices, are top of the list for patching/updating, make sure that you're actively managing lifecycle, to include the resources to deploy/cutover new equipment as well as purchase it. You're going to want top-down support here.

Lee Neely
This is a timely reminder that security devices are sadly just as vulnerable as any other device. This means we need to ensure that we treat the security devices we rely on, in particular those perimeter security devices, with extra care. The UK's National Cyber Security Centre (NCSC) has an excellent blog post on this topic that you should read: "Products on your perimeter considered harmful (until proven otherwise)" https://www.ncsc.gov.uk/blog-post/products-on-your-perimeter.

Brian Honan
Get used to patching. Maybe after 20 years of SSL VPN, it's time to think about these systems as they are now increasingly targeted by attackers.

Moses Frost
Read more in
Palo Alto Networks: CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect
The Register: Zero-day exploited right now in Palo Alto Networks' GlobalProtect gateways
Security Week: Palo Alto Networks Releases Fixes for Firewall Zero-Day as Attribution Attempts Emerge
NVD: CVE-2024-3400 Detail