Language:
http://www.nessus.org/u?9a9a8f24
https://security.paloaltonetworks.com/CVE-2024-3400
https://unit42.paloaltonetworks.com/cve-2024-3400/
https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/
Severity: Critical
ID: 193255
File Name: palo_alto_CVE-2024-3400.nasl
Version: 1.11
Type: combined
Family: Palo Alto Local Security Checks
Published: 4/12/2024
Updated: 7/12/2024
Configuration: Enable paranoid mode
Supported Sensors: Nessus
Risk Factor: Critical
Score: 10.0
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.7
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2024-3400
Risk Factor: Critical
Base Score: 10
Temporal Score: 9.5
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:C
CPE: cpe:/o:paloaltonetworks:pan-os
Required KB Items: Host/Palo_Alto/Firewall/Version, Host/Palo_Alto/Firewall/Full_Version, Host/Palo_Alto/Firewall/Source, Settings/ParanoidReport
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 4/12/2024
Vulnerability Publication Date: 4/12/2024
CISA Known Exploited Vulnerability Due Dates: 4/19/2024
Core Impact
Metasploit (Palo Alto Networks PAN-OS Unauthenticated Remote Code Execution)
CVE: CVE-2024-3400