Critical PAN-OS Flaw (CVE-2024-3400) Actively Exploited for Remote Code Execution

Palo Alto Networks PAN-OS Zero-Day Under Active Attack by State-Sponsored Hackers

CRITICAL
April 27, 2026
5m read
VulnerabilityCyberattackThreat Intelligence

Related Entities

Threat Actors

UTA0218

Products & Tech

PAN-OSGlobalProtect

CVE Identifiers

CVE-2024-3400
CRITICAL
CVSS:10

Full Report

Executive Summary

In April 2024, a critical zero-day vulnerability, CVE-2024-3400, was discovered in Palo Alto Networks PAN-OS software. This command injection flaw, rated with a CVSS score of 10.0, allows an unauthenticated attacker to achieve remote code execution (RCE) with root privileges on affected firewalls. The vulnerability was found to be under active exploitation by a threat actor identified by Volexity as UTA0218, believed to be a state-sponsored group. The attackers exploited the flaw to deploy a custom backdoor, enabling them to pivot to internal networks and exfiltrate sensitive data. Due to the active exploitation and the severity of the vulnerability, organizations using affected PAN-OS versions with GlobalProtect configured are at extreme risk and must apply patches immediately.

Vulnerability Details

The vulnerability, CVE-2024-3400, is a command injection flaw within the GlobalProtect feature of PAN-OS. An unauthenticated attacker can send a specially crafted network request to a vulnerable GlobalProtect gateway or portal to execute arbitrary commands on the firewall's underlying operating system. The commands are executed with root privileges, giving the attacker complete control over the device. This allows for the installation of malware, manipulation of firewall rules, and interception of network traffic.

Affected Systems

The vulnerability impacts the following PAN-OS versions when a GlobalProtect gateway or portal has been configured:

  • PAN-OS 10.2
  • PAN-OS 11.0
  • PAN-OS 11.1

Cloud firewalls, Panorama appliances, and Prisma Access are not affected by this vulnerability. Palo Alto Networks has provided a detailed list of affected versions and hotfix releases in its security advisory.

Exploitation Status

CVE-2024-3400 is being actively exploited in the wild. The threat actor UTA0218 was observed exploiting this vulnerability to compromise networks, establish persistence, and steal data. The ease of exploitation and the high level of access it grants make it a prime target for a wide range of threat actors beyond the initial state-sponsored group. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to patch by a specified deadline.

Impact Assessment

A successful exploit of CVE-2024-3400 has a catastrophic business impact. With root access to a core network security appliance, an attacker can:

  • Bypass all security controls: The firewall itself becomes a malicious insider, rendering network segmentation and access policies ineffective.
  • Exfiltrate sensitive data: Attackers can intercept and steal all traffic passing through the firewall, including credentials, intellectual property, and customer data.
  • Pivot to internal networks: The compromised firewall serves as a perfect beachhead for launching further attacks against internal servers and workstations.
  • Cause widespread disruption: Attackers can manipulate firewall rules to cause denial-of-service conditions, disrupting critical business operations.
  • Deploy ransomware: The compromised device can be used to deploy ransomware across the entire network.

IOCs — Directly from Articles

No specific Indicators of Compromise (IOCs) such as IP addresses or file hashes were provided in the source articles.

Cyber Observables — Hunting Hints

Security teams may want to hunt for the following patterns which could indicate related activity:

Type
URL Pattern
Value
/ssl-vpn/hip-report.esp
Description
Exploitation attempts may involve crafted requests to this endpoint.
Type
Process Name
Value
sslvpn_ngx_child
Description
Monitor for unusual child processes spawned by the GlobalProtect service process.
Type
Log Source
Value
pan_system_logs
Description
Look for unexpected configuration changes or system-level commands being executed.
Type
Network Traffic Pattern
Value
Outbound connections from the firewall's management interface to unknown IPs.
Description
Firewalls should generally not initiate outbound connections. This is a strong indicator of compromise.
Type
File Path
Value
/tmp/
Description
Attackers often write temporary files, scripts, or tools to this directory. Monitor for new or suspicious files.

Detection & Response

  • Log Analysis: Scrutinize PAN-OS logs for unusual activity related to the GlobalProtect service. Look for unexpected system commands in the command logs. Use D3FEND's Network Traffic Analysis on traffic to and from the firewall's management plane.
  • Threat Hunting: Proactively hunt for signs of compromise on your PAN-OS devices. Check for unrecognized files in common temporary directories (/tmp, /var/tmp), unexpected cron jobs, and unauthorized user accounts.
  • EDR/NDR: Ensure your Endpoint Detection and Response (EDR) and Network Detection and Response (NDR) solutions are monitoring traffic to and from the firewall. Look for anomalies such as connections to known malicious IPs or unusual data transfers.
  • Palo Alto Networks Threat Prevention: Customers with a Threat Prevention subscription can block attacks for this vulnerability by enabling Threat ID 95187.

Mitigation

  1. Patch Immediately: The primary mitigation is to apply the security updates provided by Palo Alto Networks. This is the only way to fully remediate the vulnerability. Refer to D3FEND's Software Update technique.
  2. Threat Prevention Signature: If patching is not immediately possible, enable Threat ID 95187 on your Palo Alto Networks firewall with a Threat Prevention subscription. This provides a layer of protection but is not a substitute for patching.
  3. Restrict Access: As a general best practice, restrict access to the GlobalProtect gateway to only trusted IP addresses. This can reduce the attack surface but will not protect against a determined attacker.
  4. Disable GlobalProtect: If the GlobalProtect gateway is not essential, disabling it entirely will remove the attack vector. This was an initial mitigation step suggested by Palo Alto Networks.

Timeline of Events

1
April 12, 2024
Palo Alto Networks discloses CVE-2024-3400 and reports active exploitation by threat actor UTA0218.
2
April 14, 2024
Palo Alto Networks begins releasing hotfixes for affected PAN-OS versions.
3
April 27, 2026
This article was published

MITRE ATT&CK Mitigations

Applying the patches released by Palo Alto Networks is the most critical step to mitigate this vulnerability.

Mapped D3FEND Techniques:

Using an IPS with the correct signature (Threat ID 95187) can block known exploitation attempts.

Mapped D3FEND Techniques:

Restricting access to the GlobalProtect portal to only known, trusted IP addresses reduces the attack surface.

Mapped D3FEND Techniques:

Continuously monitoring firewall logs for signs of compromise is crucial for early detection.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

The most critical and effective countermeasure against CVE-2024-3400 is to apply the vendor-supplied patches immediately. Organizations must prioritize the deployment of the hotfixes provided by Palo Alto Networks for all affected PAN-OS versions (10.2, 11.0, and 11.1). Given that this is an actively exploited zero-day with a CVSS score of 10.0, the patching process should be expedited through emergency change control procedures. Before deployment, test the patch in a non-production environment if possible, but the risk of exploitation far outweighs the risk of patch-related issues in this case. Verify successful installation by checking the PAN-OS version after the update. For organizations with large fleets of firewalls, utilize Panorama for centralized patch deployment to ensure consistent and rapid remediation across the entire infrastructure. This action directly closes the command injection vulnerability, preventing attackers from gaining initial access via this vector.

Implement robust Network Traffic Analysis focused on the firewall's own traffic. Since a compromised firewall can become a blind spot, it's crucial to monitor its communications using an external tool like a Network Detection and Response (NDR) solution or by analyzing NetFlow/IPFIX data. Specifically, establish a baseline of normal traffic patterns for the firewall's management and data plane interfaces. Configure alerts for any anomalous outbound connections originating from the firewall itself, especially to destinations on the public internet. Pay close attention to traffic volume, destination IP reputation, and protocol usage. For CVE-2024-3400, this is critical for detecting post-compromise activity, such as C2 communication or data exfiltration, even if the initial exploit was missed. This technique provides a vital detection layer for post-exploitation activity, helping to identify a compromised device before the attacker can achieve their ultimate objectives.

Timeline of Events

1
April 12, 2024

Palo Alto Networks discloses CVE-2024-3400 and reports active exploitation by threat actor UTA0218.

2
April 14, 2024

Palo Alto Networks begins releasing hotfixes for affected PAN-OS versions.

Sources & References

Top Trending CVEs of April 2024 - NopSec
NopSec (nopsec.com) April 26, 2024

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

zero-dayCVE-2024-3400Palo Alto NetworksPAN-OSRCEcommand injectionUTA0218firewallGlobalProtect

📢 Share This Article

Help others stay informed about cybersecurity threats