#cve20243400 — Public Fediverse posts
Live and recent posts from across the Fediverse tagged #cve20243400, aggregated by home.social.
-
Palo Alto Networks #GlobalProtect 0day exploited since at least March 26 - https://www.bleepingcomputer.com/news/security/palo-alto-networks-zero-day-exploited-since-march-to-backdoor-firewalls/ #paloaltonetworks #commandinjection #vulnerability #infosec #cybersecurity #cve20243400
-
📬 GlobalProtect von Palo Alto Networks anfällig für Hacker
#Cyberangriffe #Datenschutz #ITSicherheit #CVE20243400 #GlobalProtect #PaloAltoNetworks #PANOS #Volexity https://sc.tarnkappe.info/bf6b73 -
Palo Alto Networks have really dropped a bollock today with CVE-2024-3400. As of 0945GMT the threat db update mentioned in the advisory does NOT contain the threat id mentioned in the advisory. So either they cocked up and didn't add the new signature, or they failed to properly edit the advisory and a typo slipped through.
In the interim we've disabled telemetry until the threat id (whatever the actual number is) is available, or the promised update.
-
CVE-2024-3400 PAN-OS: OS Command Injection #Vulnerability in #GlobalProtect Gateway
A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.
This issue will be fixed in hotfix releases of PAN-OS 10.2.9-h1 (ETA: By 4/14), PAN-OS 11.0.4-h1 (ETA: By 4/14), and PAN-OS 11.1.2-h3 (ETA: By 4/14), and in all later PAN-OS versions.
ref: https://security.paloaltonetworks.com/CVE-2024-3400 #paloaltonetworks #commandinjection #vulnerability #infosec #cybersecurity #cve20243400