Businessman using digital tablet and icon network connection data information with growth graph, digital marketing, banking and payment online, analysis and planning of business.
Insight Type: Blog
Maidar Secure Advisory: Unauthenticated Remote Shell Command Execution Vulnerability CVE-2024-3400 in PAN-OS

Palo Alto Networks has disclosed a critical security vulnerabilities in PAN-OS that is actively being exploited by malicious actors. This threat advisory aims to provide comprehensive information on the issue and necessary actions to mitigate risks.

Description of Vulnerability

The vulnerability, tracked as CVE-2024-3400, is a combination of two bugs in PAN-OS versions 10.2, 11.0, and 11.1, allowing unauthenticated remote shell command execution.

Attack Details

The threat actor, UTA0218, conducted a two-stage attack named Operation MidnightEclipse, exploiting PAN-OS flaw for command execution on vulnerable devices.

Exploitation Techniques

Specially crafted requests containing commands are sent to devices, leveraging a backdoor named UPSTYLE. The attacker uses cron jobs and wget to execute commands and download malicious tools.

Scope of Impact

Approximately 22,542 internet-exposed firewall devices are vulnerable globally, with the majority located in the U.S., Japan, India, Germany, the U.K., Canada, Australia, France, and China.

Patch and Mitigation

Palo Alto Networks has released patches for affected PAN-OS versions. Users are strongly advised to apply hotfixes immediately to prevent exploitation.

Recommendation

  • Apply hotfixes for PAN-OS versions 10.2, 11.0, and 11.1.
  • Monitor for suspicious activity, especially unauthorized commands and file creation.
  • Implement network segmentation and access controls to limit exposure.

References

Contact Us

If you have any questions or require further information on any other Cyber Security matters, please don’t hesitate to contact our dedicated team at [email protected].

If you want to see more about the SOC service we offer, please follow this link https://maidar.io.

To ask a question, go to our support portal.

Share Articles

Insights

News Centre

Media Type
Why a Security Operations Center (SOC) is Essential for Businesse...
Organizations face constant threats to their digital assets, from malware and phishing to unauthorized access and advanced cyberattacks. Protecting sensitive data, ensuring operational continuity, and maintaining trust...
Security Automation, Orchestration & Response
As a leading provider of SOC-as-a-Service (SOCaaS), Maidar Secure helps customers automate their repetitive security operations tasks through various means. Here are some examples: Playbook Automation: Our team develo...
Standard SOC‑as‑a‑Service (SOCaaS)
Standard SOC-as-a-Service (SOCaaS) with SIEM Platform: A Proven Solution for Enhanced Security As a leading provider of SOC-as-a-Service (SOCaaS), Maidar Secure SOC offers a standard SOC-as-a-Service (SOCaaS) solution ...
SOC‑as‑a‑Service (SOCaaS) with SIEM
Unlocking the Power of Your Security Information and Event Management (SIEM) Solution with Maidar Secure SOC As a leading provider of SOC-as-a-Service (SOCaaS), Maidar Secure SOC understands the critical role that Secu...
Flexibility in our offerings
Flexibility Matters: Why Maidar Secure SOC’s SOC Services are Designed to Meet Your Needs As a business leader, you know that every organisation is unique. You have specific security needs, priorities, and goals ...
Maidar Secure Advisory: Multiple Zero‑Day Vulnerabilities in Chro...
Google has released multiple security updates to address several high-severity zero-day vulnerabilities in its Chrome web browser. These vulnerabilities have been actively exploited in the wild, posing significant secu...
Hope is not a security strategy. Get proactive about your defence today with Maidar Secure.