- Product
Product Overview
Sophisticated security with unmatched simplicityCloud SIEM
Pre-configured detections across your environmentHoneypots
Deception technology to detect lateral movementEndpoint Visibility
Real-time monitoring with added detection & responseSecurity Reports
Data visualizations, compliance reports, and executive summariesAutomated Response
Detect, prioritize, and neutralize threats around the clockIntegrations
Cloud, on-prem, and open API connectionsXDR Platform
A complete view to identify risk, and things operational
- Pricing
- Why Blumira
Why Blumira
The Security Operations platform IT teams loveWatch A Demo
See Blumira in action and how it builds operational resilienceUse Cases
A unified security solution for every challengePricing
Unlimited data and predictable pricing structureCompany
Our human-centered approach to cybersecurityCompare Blumira
Find out how Blumira stacks up to similar security toolsIntegrations
Cloud, on-prem, and open API connectionsCustomer Stories
Learn how others like you found success with Blumira
- Solutions
- Partners
- Resources
What Happened?
On Friday (4-12-24), Palo Alto announced a new critical vulnerability in devices running their GlobalProtect Gateway. Successful exploitation of this vulnerability leads to command injection and allows an attacker to run arbitrary code as root on the device.
Palo Alto disclosed that they are aware of a “limited number of attacks” using this vulnerability (CVE-2024-3400) in the wild. However, since this is a publicly facing service, it’s more than likely that attackers will begin to increasingly leverage this vulnerability.
Impacted Versions, Available Patches, and Workarounds
Impacted versions of PAN-OS for CVE-2024-3400 include the following:
- PAN-OS 10.2 (earlier than 10.2.9)
- PAN-OS 11.0 (earlier than 11.0.4)
- PAN-OS 11.1 (earlier than 11.1.2)
Palo Alto expects to release patches for these versions by 4-14-24.
To be exposed to this vulnerability, devices on the affected versions also need to have configurations that enable GlobalProtect Gateway and device telemetry.
Palo Alto’s recommendation for customers subscribed to Palo Alto’s Threat Prevention service is to enable Threat ID 95187. Alternatively, Palo Alto customers can temporarily disable device telemetry until a patch is available.
If you are not running GlobalProtect Gateway, then no action is needed.
How Bad Is This?
HIGH RISK
This vulnerability results in remote code execution (RCE). RCE-based exploits are among the highest in criticality because an attacker can gain full access (root in this case). Although the vulnerability depends on a pair of services being enabled on the device, it is still serious enough to earn a rare 10 CVE rating. As stated above, Palo Alto is aware of a limited number of cases in which this is being exploited already.
How Blumira Can Help
At the time of writing, there are no technical details available about the nature of the attacks or what indicators of compromise exist. When those details emerge, we’ll begin the process of creating detections and reports. We’ll also update this article as more information becomes available.
It’s nearly impossible for admins to track every vulnerability, but Blumira’s security experts perform threat hunting on your behalf and develop detections in real time to protect your environment.
Update 1: 4-12-24
Early indicators of compromise have surfaced from the team that reported the vulnerability to Palo Alto, Volexity, which can be found here and comprise IPs and hashes seen in the aforementioned recent attacks. While IPs and hashes change quite quickly as attackers modify their tactics to avoid detection we can use the IP listing to search for traffic to and from these IPs. Blumira now has two saved reports that can aid in your investigations:
- Palo Alto: Allowed Inbound Traffic From IPs Associated With CVE-2024-3400
- Palo Alto: Allowed Outbound Traffic From IPs Associated With CVE-2024-3400
Update 2: 4-15-24
Palo Alto has updated their post to indicate that the first round of hotfixes are out to address this issue. They have also announced that more commonly used “maintenance” versions will be receiving a hotfix to address this issue in the coming days. The saved reports mentioned in the prior update are still valid according to Palo Alto’s Unit 42 posting for finding potential indicators of compromise. We’ll update the search parameters to the reports as more details surface.
Justin Kikani
At Blumira, Justin helps to craft detection rules as part of the Incident Detection Engineering team. Prior to joining the team, he was the Director of IT at Nexus Direct, where he supported the company in its transition to a remote infrastructure. Before that, he held various IT and engineering roles, including a...
More from the blog
View All Posts
Security Trends and Info
9 min read
| July 24, 2025
Critical Microsoft SharePoint Server vulnerability allows unauthorized code execution
Read More
Security Alerts
6 min read
| July 1, 2024
New Unauthenticated Remote Code Execution Flaw Identified in OpenSSH Server
Read More
Security Alerts
5 min read
| April 12, 2024
CVE-2024-3400: Palo Alto Vulnerabilities in GlobalProtect Gateway Lead to RCE
Read MoreSubscribe to email updates
Stay up-to-date on what's happening at this blog and get additional content about the benefits of subscribing.