Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2024-3400

Description

A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.

POC

Reference

- https://security.paloaltonetworks.com/CVE-2024-3400

- https://unit42.paloaltonetworks.com/cve-2024-3400/

Github

- https://github.com/0day404/HV-2024-POC

- https://github.com/0x0d3ad/CVE-2024-3400

- https://github.com/0xAj-Krishna/biggest-hack

- https://github.com/0xAj-Krishna/biggest-hack-2023-24

- https://github.com/0xMarcio/cve

- https://github.com/0xr2r/CVE-2024-3400-Palo-Alto-OS-Command-Injection

- https://github.com/12442RF/POC

- https://github.com/20142995/nuclei-templates

- https://github.com/ARPSyndicate/cve-scores

- https://github.com/AboSteam/POPC

- https://github.com/AdaniKamal/CVE-2024-3400

- https://github.com/CONDITIONBLACK/CVE-2024-3400-POC

- https://github.com/CerTusHack/CVE-2024-3400-PoC

- https://github.com/Chocapikk/CVE-2024-3400

- https://github.com/Cyb3rTim/Cyber-Threat-Intelligence-Dashboard

- https://github.com/CyberBibs/Labs

- https://github.com/CyberBibs/SOC274---Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400-

- https://github.com/CyprianAtsyor/letsdefend-cve2024-3400-case-study

- https://github.com/DMW11525708/wiki

- https://github.com/DharunTeja-2023/AI-Cyber-Threat-Intelligence-Platform

- https://github.com/DrewskyDev/CVE-2024-3400

- https://github.com/FoxyProxys/CVE-2024-3400

- https://github.com/GhostTroops/TOP

- https://github.com/H4lo/awesome-IoT-security-article

- https://github.com/HackingLZ/panrapidcheck

- https://github.com/Just-Hack-For-Fun/NOPTrace-Configs

- https://github.com/Kr0ff/cve-2024-3400

- https://github.com/Lern0n/Lernon-POC

- https://github.com/Linxloop/fork_POC

- https://github.com/LoanVitor/CVE-2024-3400-

- https://github.com/MarcUrbano/CVE-PoC-Hunter

- https://github.com/MrR0b0t19/CVE-2024-3400

- https://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker

- https://github.com/Ostorlab/KEV

- https://github.com/PuddinCat/GithubRepoSpider

- https://github.com/Ravaan21/CVE-2024-3400

- https://github.com/T43cr0wl3r/Gorilla_Sessions

- https://github.com/Tig3rHu/Awesome_IOT_Vul_lib

- https://github.com/Veridano/veridano-mcp-server

- https://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan

- https://github.com/Warren-Jace/poc-doc

- https://github.com/WatchDog1307/SOC-Web-attack-investigation

- https://github.com/WhosGa/MyWiki

- https://github.com/XiaomingX/CVE-2024-3400-poc

- https://github.com/Yuan08o/pocs

- https://github.com/Yuvvi01/CVE-2024-3400

- https://github.com/ZephrFish/CVE-2024-3400-Canary

- https://github.com/admin772/POC

- https://github.com/adminlove520/pocWiki

- https://github.com/adysec/POC

- https://github.com/ak1t4/CVE-2024-3400

- https://github.com/andrelia-hacks/CVE-2024-3400

- https://github.com/aneasystone/github-trending

- https://github.com/barkandbite/iranian-apt-detection

- https://github.com/cisp-pte/POC-20241008-sec-fork

- https://github.com/codeblueprint/CVE-2024-3400

- https://github.com/duggytuxy/Data-Shield_IPv4_Blocklist

- https://github.com/duggytuxy/Intelligence_IPv4_Blocklist

- https://github.com/eeeeeeeeee-code/POC

- https://github.com/enomothem/PenTestNote

- https://github.com/eswar152319/eswar

- https://github.com/fatguru/dorks

- https://github.com/febrian96r/Cybersecurity-Portfolio

- https://github.com/febrian96r/febrian96r

- https://github.com/fireinrain/github-trending

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/greenberglinken/2023hvv_1

- https://github.com/h4x0r-dz/CVE-2024-3400

- https://github.com/hackerhijeck/CVE-Exploit

- https://github.com/hahasagined/CVE-2024-3400

- https://github.com/hashdr1ft/SOC274-Palo-Alto-Networks-PAN-OS-Command-Injection-Vulnerability-Exploitation-CVE-2024-3400

- https://github.com/iemotion/POC

- https://github.com/ihebski/CVE-2024-3400

- https://github.com/index2014/CVE-2024-3400-Checker

- https://github.com/iwallarm/cve-2024-3400

- https://github.com/jcaballero/cve-scanner

- https://github.com/k4nfr3/nmap-scripts

- https://github.com/kerberoshacker/CVE-2024-3400-POC

- https://github.com/kerberoshacker2/CVE-2024-3400-POC

- https://github.com/laoa1573/wy876

- https://github.com/lirantal/cve-cvss-calculator

- https://github.com/lodetomasi/zero-day-llm-ensemble

- https://github.com/maheavula/Incident-Investigation-Response

- https://github.com/marconesler/CVE-2024-3400

- https://github.com/momika233/CVE-2024-3400

- https://github.com/nanwinata/CVE-2024-3400

- https://github.com/netlas-io/netlas-dorks

- https://github.com/nitish778191/fitness_app

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/oLy0/Vulnerability

- https://github.com/ozanunal0/viper

- https://github.com/patrickmgarrity/threatcon1-lab

- https://github.com/phantomradar/cve-2024-3400-poc

- https://github.com/picuslabs/Picus-Emerging-Threat-Response

- https://github.com/plzheheplztrying/cve_monitor

- https://github.com/pwnj0hn/CVE-2024-3400

- https://github.com/retkoussa/CVE-2024-3400

- https://github.com/schooldropout1337/CVE-2024-3400

- https://github.com/schooldropout1337/gorilla

- https://github.com/shreyxploit/ThreatLens

- https://github.com/stronglier/CVE-2024-3400

- https://github.com/swaybs/CVE-2024-3400

- https://github.com/sxyrxyy/CVE-2024-3400-Check

- https://github.com/t0chka1312/r3g4l1z-container2

- https://github.com/tanjiti/sec_profile

- https://github.com/terminalJunki3/CVE-2024-3400-Checker

- https://github.com/tfrederick74656/cve-2024-3400-poc

- https://github.com/tk-sawada/IPLineFinder

- https://github.com/toxyl/lscve

- https://github.com/v3153/v3153

- https://github.com/vulsio/go-cve-dictionary

- https://github.com/wjlin0/poc-doc

- https://github.com/wooluo/POC00

- https://github.com/workshop748/CVE-2024-3400

- https://github.com/wy876/POC

- https://github.com/wy876/wiki

- https://github.com/xr0r/Dorks

- https://github.com/zam89/CVE-2024-3400-pot

- https://github.com/zhanpengliu-tencent/medium-cve