CVE-2024-3400: What You Need to Know About the Critical PAN-OS Zero-Day
Assess risk exposure and rapidly identify exposed PAN-OS assets with CrowdStrike Falcon® Exposure Management
CrowdStrike is constantly working to protect our customers from the newest and most advanced cybersecurity threats. We are actively monitoring activity related to CVE-2024-3400, a critical command injection vulnerability in the GlobalProtect feature of Palo Alto Networks’ PAN-OS software affecting “specific PAN-OS versions and distinct feature configurations,” the vendor says.
This vulnerability, which has been given a CVSSv4.0 score of 10 by the vendor, has been observed being exploited in the wild. If exploited, CVE-2024-3400 could allow an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. At the time of writing, there is no patch available. Palo Alto Networks says a patch will be ready by April 14, 2024.
Here, we explain how customers of the CrowdStrike Falcon® platform can assess their risk exposure to this vulnerability. Customers should also monitor the vendor’s website for up-to-date information on vulnerable product versions, mitigations and available patches.
Assessing Risk Exposure to CVE-2024-3400
When a new and actively exploited vulnerability is reported, one of the first actions security teams must take is determining their exposure to the issue. Understanding which of their internet-exposed assets could potentially be affected by the vulnerability is the first step to understanding exposure — and clear visibility into internet-facing devices is essential.
After identifying potentially vulnerable assets, the next step is to understand if the exposed assets have the required conditions for the vulnerability to be present.
According to the vendor information, some of the most recent PAN-OS versions (listed below) are affected. An asset will be affected if the GlobalProtect gateways and device telemetry are enabled. If these features are not enabled, this vulnerability cannot be exploited.
Version | Vulnerable Version | Telemetry Enabled Required? | Fixed Version | Estimated Patch Release Date |
PAN-OS 11.1 | Less than 11.1.2-h3 | Yes | 11.1.2-h3 | 04/14/2024 |
PAN-OS 11.0 | Less than 11.0.04-h1 | Yes | 11.0.04-h1 | 04/14/2024 |
PAN-OS 10.2 | Less than 10.2.9-h1 | Yes | 10.2.9-h1 | 04/14/2024 |
Table 1. PAN-OS versions vulnerable to CVE-2024-3400
CrowdStrike Falcon Exposure Management customers can quickly identify exposed PAN-OS assets in their environments by filtering directly from the external attack surface management capability. This will help customers quickly identify all of the potential exposures, thereby proactively reducing the impact of a potential exploitation.
Filter | Value | Expected Result |
Banner | GlobalProtect | All devices that return a GlobalProtect Banner |
Platform | PAN-OS | All devices that are on a PAN-OS platform |
Table 2. Falcon Exposure Management query filters to detect CVE-2024-3400
As pictured below, Falcon Exposure Management customers can broaden their search for all Palo Alto Networks devices by selecting the platform “PAN-OS,” enabling them to locate firewalls running the vulnerable version of GlobalProtect.
How Many Assets Could Be Affected?
Customers of CrowdStrike Falcon® Counter Adversary Operations who would like to identify the total number of potentially vulnerable internet-exposed assets can navigate to “External attack surface explore” located in the “External monitoring” section of the Counter Adversary Operations menu. There, they can use some of the following filters to view other PAN-OS assets visible on the broader internet:
Query | Expected Result |
attributes_raw contains (Phrase) ‘Palo Alto Networks PA-200 series’ or banners_raw contains (Phrase) ‘GlobalProtect Portal’ | Returns any device whose attributes contain the phrase “Palo Alto Networks PA-200 series” or returns the phrase “GlobalProtect Portal” in the HTML banner |
platform.name contains (Phrase) ‘Pan-os’ | Returns any device with “PAN-OS”‘ in its platform name |
‘cpe:/a:paloaltonetworks:pan-os’ | Returns any device that is noted as having PAN-OS installed |
Table 3. Queries for detecting possible vulnerable assets in “External attack surface explore,” an external monitoring feature in Counter Adversary Operations
Conclusion and Recommendations
Critical vulnerabilities, especially those actively exploited, pose a high risk to organizations. In order to mitigate the risk of exploitation, those affected by CVE-2024-3400 are advised to disable Telemetry on all internet-accessible vulnerable appliances and update all of them when the vendor releases a patch. In addition, it is advised to increase monitoring of vulnerable appliances as well as non-vulnerable assets potentially accessible by the appliance.
Our product and internal security teams continue to actively monitor this dynamic and ongoing situation. CrowdStrike will continue to take additional steps, including mitigation and patching. As new information becomes available, we will publish updates as necessary. In tandem, we continue to develop and release new behavioral logic for the Falcon platform to detect and prevent malicious behavior related to CVE-2024-3400.
Additional Resources
- See Falcon’s unrivaled protection in action in a short demo.
- Learn about our threat intelligence and hunting subscriptions.
- Experience how the industry-leading CrowdStrike Falcon® platform protects against modern threats. Start your 15-day free trial today.