In April 2024, a critical zero-day vulnerability, CVE-2024-3400, was discovered in Palo Alto Networks PAN-OS software. This command injection flaw, rated with a CVSS score of 10.0, allows an unauthenticated attacker to achieve remote code execution (RCE) with root privileges on affected firewalls. The vulnerability was found to be under active exploitation by a threat actor identified by Volexity as UTA0218, believed to be a state-sponsored group. The attackers exploited the flaw to deploy a custom backdoor, enabling them to pivot to internal networks and exfiltrate sensitive data. Due to the active exploitation and the severity of the vulnerability, organizations using affected PAN-OS versions with GlobalProtect configured are at extreme risk and must apply patches immediately.
The vulnerability, CVE-2024-3400, is a command injection flaw within the GlobalProtect feature of PAN-OS. An unauthenticated attacker can send a specially crafted network request to a vulnerable GlobalProtect gateway or portal to execute arbitrary commands on the firewall's underlying operating system. The commands are executed with root privileges, giving the attacker complete control over the device. This allows for the installation of malware, manipulation of firewall rules, and interception of network traffic.
The vulnerability impacts the following PAN-OS versions when a GlobalProtect gateway or portal has been configured:
Cloud firewalls, Panorama appliances, and Prisma Access are not affected by this vulnerability. Palo Alto Networks has provided a detailed list of affected versions and hotfix releases in its security advisory.
CVE-2024-3400 is being actively exploited in the wild. The threat actor UTA0218 was observed exploiting this vulnerability to compromise networks, establish persistence, and steal data. The ease of exploitation and the high level of access it grants make it a prime target for a wide range of threat actors beyond the initial state-sponsored group. CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to patch by a specified deadline.
A successful exploit of CVE-2024-3400 has a catastrophic business impact. With root access to a core network security appliance, an attacker can:
No specific Indicators of Compromise (IOCs) such as IP addresses or file hashes were provided in the source articles.
Security teams may want to hunt for the following patterns which could indicate related activity:
/ssl-vpn/hip-report.espsslvpn_ngx_childpan_system_logs/tmp/Network Traffic Analysis on traffic to and from the firewall's management plane./tmp, /var/tmp), unexpected cron jobs, and unauthorized user accounts.95187.Software Update technique.95187 on your Palo Alto Networks firewall with a Threat Prevention subscription. This provides a layer of protection but is not a substitute for patching.Applying the patches released by Palo Alto Networks is the most critical step to mitigate this vulnerability.
Mapped D3FEND Techniques:
Using an IPS with the correct signature (Threat ID 95187) can block known exploitation attempts.
Restricting access to the GlobalProtect portal to only known, trusted IP addresses reduces the attack surface.
Mapped D3FEND Techniques:
The most critical and effective countermeasure against CVE-2024-3400 is to apply the vendor-supplied patches immediately. Organizations must prioritize the deployment of the hotfixes provided by Palo Alto Networks for all affected PAN-OS versions (10.2, 11.0, and 11.1). Given that this is an actively exploited zero-day with a CVSS score of 10.0, the patching process should be expedited through emergency change control procedures. Before deployment, test the patch in a non-production environment if possible, but the risk of exploitation far outweighs the risk of patch-related issues in this case. Verify successful installation by checking the PAN-OS version after the update. For organizations with large fleets of firewalls, utilize Panorama for centralized patch deployment to ensure consistent and rapid remediation across the entire infrastructure. This action directly closes the command injection vulnerability, preventing attackers from gaining initial access via this vector.
Implement robust Network Traffic Analysis focused on the firewall's own traffic. Since a compromised firewall can become a blind spot, it's crucial to monitor its communications using an external tool like a Network Detection and Response (NDR) solution or by analyzing NetFlow/IPFIX data. Specifically, establish a baseline of normal traffic patterns for the firewall's management and data plane interfaces. Configure alerts for any anomalous outbound connections originating from the firewall itself, especially to destinations on the public internet. Pay close attention to traffic volume, destination IP reputation, and protocol usage. For CVE-2024-3400, this is critical for detecting post-compromise activity, such as C2 communication or data exfiltration, even if the initial exploit was missed. This technique provides a vital detection layer for post-exploitation activity, helping to identify a compromised device before the attacker can achieve their ultimate objectives.
Palo Alto Networks discloses CVE-2024-3400 and reports active exploitation by threat actor UTA0218.
Palo Alto Networks begins releasing hotfixes for affected PAN-OS versions.

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats