There are proof-of-concept techniques allowing attackers to achieve persistence on Palo Alto Networks firewalls after CVE-2024-3400 has been exploited, the company has confirmed on Monday, but they are “not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability.” “These techniques work on a device that is already compromised with interactive root level command execution,” they added. The evolving situation On April 12, Palo Alto Networks … More

The post Palo Alto firewalls: CVE-2024-3400 exploitation and PoCs for persistence after resets/upgrades appeared first on Help Net Security.


Leave a Reply

Your email address will not be published. Required fields are marked *