Overview
CVE-2024-3400 is a CVSS 10.0 command injection vulnerability in Palo Alto Networks PAN-OS, exploitable via the GlobalProtect Gateway or GlobalProtect Portal feature. An unauthenticated attacker can chain two bugs — an arbitrary file creation vulnerability and a command injection triggered by a cron job — to execute arbitrary OS commands as root on the firewall. The vulnerability was exploited as a zero-day by threat actor UTA0218 (assessed by Unit 42 as likely a Chinese state-sponsored group) beginning at least 17 days before the patch was released.
The 7-day CISA remediation deadline and CVSS 10.0 score reflect the severity of an internet-facing network security appliance — a next-generation firewall — being fully compromised by an unauthenticated attacker with no user interaction required.
What Is PAN-OS GlobalProtect?
PAN-OS is the operating system running Palo Alto Networks next-generation firewalls and Panorama management appliances. The GlobalProtect feature provides SSL VPN and zero-trust network access for remote users, exposing a gateway and/or portal endpoint on the internet. Organizations deploy GlobalProtect as their primary remote access VPN — making the firewall appliance itself a high-value target that, if compromised, provides a privileged network position to observe and intercept all traffic passing through the firewall.
Affected Versions
The vulnerability requires GlobalProtect gateway or GlobalProtect portal to be configured on the device and device telemetry to be enabled (enabled by default). Devices without GlobalProtect configured are not affected.
| PAN-OS Version | Vulnerable | Fixed Version |
|---|---|---|
| PAN-OS 11.1 | Before 11.1.2-h3 | 11.1.2-h3 |
| PAN-OS 11.0 | Before 11.0.4-h1 | 11.0.4-h1 |
| PAN-OS 10.2 | Before 10.2.9-h1 | 10.2.9-h1 |
| PAN-OS 10.1 and earlier | Not affected | — |
| Cloud NGFW | Not affected | — |
| Prisma Access | Not affected | — |
Technical Details
Root Cause: Two Vulnerabilities Chained for RCE
CVE-2024-3400 is the result of two separate bugs working together:
Bug 1 — Arbitrary File Creation via SESSID Cookie:
The GlobalProtect gateway processes session cookies from unauthenticated requests. The SESSID cookie value is used as part of a filename for temporary session files written to disk. The value is not sufficiently sanitized — an attacker can embed path traversal characters or shell metacharacters in the SESSID value, causing PAN-OS to create a file at an attacker-controlled path with attacker-controlled content.
Bug 2 — Command Injection via Cron Job:
PAN-OS runs a periodic cron job (related to telemetry or session management) that processes files in the session file directory. When it encounters files whose names contain shell metacharacters — specifically from the SESSID values written by Bug 1 — the cron job's shell invocation treats those characters as commands, executing attacker-supplied OS commands.
Combined: the attacker sends a crafted HTTP request with a malicious SESSID cookie → PAN-OS creates a file with the malicious content/name → the cron job executes → attacker commands run as root.
UPSTYLE Backdoor
UTA0218's post-exploitation tooling included a Python-based backdoor named UPSTYLE, which:
- Patches legitimate PAN-OS Python files to add a hidden backdoor
- Listens for specially crafted network packets to trigger command execution
- Extracts and executes commands from the
User-Agentheader of HTTPS requests to the firewall - Designed to blend into normal PAN-OS process activity
Additional tools deployed included TUNNELCRACK, MURKYTOP, and network tunneling utilities for lateral movement into victim networks.
Attack Characteristics
| Attribute | Detail |
|---|---|
| Attack Vector | Network — GlobalProtect gateway/portal HTTPS endpoint |
| Authentication Required | None — unauthenticated exploitation |
| Telemetry Required | Yes — device telemetry must be enabled (default) |
| Code Execution Level | Root on the firewall OS |
| Scope Changed | Yes (CVSS Scope: Changed) — firewall compromise affects all traffic it processes |
| Zero-Day Window | At least 17 days (March 26 – April 14) |
Discovery
Volexity discovered active exploitation of CVE-2024-3400 on March 26, 2024 while responding to a customer incident. They observed UTA0218 exploiting the GlobalProtect feature to create an interactive reverse shell, deploy the UPSTYLE backdoor, and exfiltrate data. Volexity reported the vulnerability to Palo Alto Networks on April 10, 2024; Palo Alto issued a public advisory on April 12 and released patches on April 14.
Palo Alto Networks Unit 42 assessed UTA0218 as likely a Chinese state-sponsored threat actor based on tooling, tradecraft, and targeting patterns — consistent with groups that routinely target network edge devices for persistent, hard-to-detect access.
Exploitation Context
- 17-day zero-day window: Exploitation confirmed from March 26; patch released April 14
- Targeting: UTA0218 focused on espionage — stealing VPN credentials, internal Active Directory data, and sensitive files from compromised organizations
- Scale: Approximately 82,000 PAN-OS devices were estimated to have GlobalProtect exposed to the internet at time of disclosure
- Subsequent exploitation: After public disclosure and PoC availability, exploitation expanded beyond UTA0218 to opportunistic attackers and ransomware operators
- 7-day CISA deadline: The April 19 deadline (7 days after disclosure) was among the shortest ever imposed by CISA, reflecting the combination of CVSS 10.0, active nation-state exploitation, and the privileged network position of firewall appliances
Remediation
Recommended Actions
-
Apply the PAN-OS hotfix for your version (see table above). Verify:
show system info | match version. -
Interim mitigations (if patching is delayed):
- Disable device telemetry:
Device > Setup > Telemetry— uncheck "Enable Telemetry". This breaks the cron job component of the exploit chain. - Enable Threat Prevention and activate Threat IDs 95187, 95189, 95191 (released by Palo Alto to block exploitation attempts).
- Disable device telemetry:
-
Check for UPSTYLE and compromise indicators:
- Check for unexpected Python file modifications:
find /usr/lib/python3* -newer /etc/passwd -name "*.py" - Review GlobalProtect logs for unusual SESSID values or path traversal patterns
- Check for unexpected processes or network connections from the firewall OS
- Palo Alto Unit 42 published detailed IOCs; review the Unit 42 threat brief
- Check for unexpected Python file modifications:
-
Restrict GlobalProtect management access — firewall management interfaces (web UI, SSH) should be on a dedicated management network, not accessible from the internet.
-
Incident response: If compromise is suspected, treat the firewall as fully compromised — assume all traffic it processed may have been observed, all VPN credentials may be stolen, and all firewall rules/configuration may be known to the attacker.
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2024-3400 |
| Vendor / Product | Palo Alto Networks — PAN-OS |
| NVD Published | 2024-04-12 |
| NVD Last Modified | 2025-11-04 |
| CVSS 3.1 Score | 10 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H |
| Severity | CRITICAL |
| CWE | CWE-20 — Improper Input Validation |
| CISA KEV Added | 2024-04-12 |
| CISA KEV Deadline | 2024-04-19 |
| Known Ransomware Use | ⚠️ Yes |
CVSS 3.1 Breakdown
Required Action
Timeline
| Date | Event |
|---|---|
| 2024-03-26 | Volexity observes earliest known exploitation of CVE-2024-3400 in the wild |
| 2024-04-10 | Volexity reports the vulnerability to Palo Alto Networks |
| 2024-04-12 | Palo Alto Networks issues advisory and CVSS 10.0 alert; CVE-2024-3400 published; CISA KEV added same day |
| 2024-04-14 | Patches released for PAN-OS 10.2, 11.0, 11.1 |
| 2024-04-19 | CISA BOD 22-01 remediation deadline (7 days after disclosure — one of the shortest ever) |
| 2024-04-22 | Unit 42 publishes attribution analysis of UTA0218 (likely Chinese state-sponsored) |
References
| Resource | Type |
|---|---|
| NVD — CVE-2024-3400 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |
| Palo Alto Networks Security Advisory — CVE-2024-3400 | Vendor Advisory |
| Volexity: Zero-Day Exploitation of GlobalProtect CVE-2024-3400 | Security Research |
| Palo Alto Unit 42: Threat Brief — CVE-2024-3400 | Security Research |
| BleepingComputer: Palo Alto Networks PAN-OS Firewall Zero-Day Used in Attacks | Security Research |
| CWE-20 — Improper Input Validation | Weakness Classification |