Loading
Generated remediation guidance and an executive summary. No account required.
A command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.
Use CWE-20, Paloaltonetworks vendor hub and Pan-Os product page to widen CVE-2024-3400 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2024-0012, CVE-2025-0108 and CVE-2024-3393 for nearby disclosures in the same product family.