Palo Alto 安全中心 2024年07月04日
CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtect (Severity: CRITICAL)
index_new5.html
../../../zaker_core/zaker_tpl_static/wap/tpl_guoji1.html

 

Palo Alto Networks发布了针对PAN-OS软件中GlobalProtect功能的命令注入漏洞的安全公告,该漏洞可能允许未经身份验证的攻击者在防火墙上以root权限执行任意代码。该漏洞影响特定版本的PAN-OS和特定功能配置,而Cloud NGFW、Panorama设备和Prisma Access不受影响。

🎯 该漏洞是由于GlobalProtect功能中存在任意文件创建漏洞导致的命令注入漏洞,可能允许攻击者在防火墙上以root权限执行任意代码。 该漏洞影响特定版本的PAN-OS和特定功能配置,具体来说,影响了配置了GlobalProtect网关或GlobalProtect门户(或两者)的PAN-OS 10.2、PAN-OS 11.0和PAN-OS 11.1防火墙。 为了利用该漏洞,攻击者需要发送精心构造的HTTP请求到受影响的防火墙,从而利用GlobalProtect功能中的漏洞创建任意文件。攻击者随后可以利用该文件执行任意代码,从而获得对防火墙的完全控制权。

🛡️ Palo Alto Networks已发布针对该漏洞的补丁,建议用户立即升级到已修复版本的PAN-OS。 此外,为了提供更无缝的升级路径,Palo Alto Networks还发布了一些针对其他常见部署维护版本的热修复程序。 除了升级到已修复版本的PAN-OS外,用户还可以通过以下几种方法来缓解该漏洞: 1. 启用威胁防护订阅,并使用威胁ID 95187、95189和95191来阻止攻击。 2. 确保在GlobalProtect界面上应用漏洞防护,以防止在设备上利用该漏洞。

⚠️ Palo Alto Networks已知有越来越多的攻击利用该漏洞进行攻击。第三方已公开发布了该漏洞的概念验证。 Palo Alto Networks还了解到第三方发布了针对该漏洞的漏洞利用后的持久性技术的概念验证,这些技术可以在重置和升级后仍然存在。 目前,Palo Alto Networks尚未发现任何恶意企图使用这些持久性技术来积极利用该漏洞。以下列出的修复程序和威胁防护签名完全阻止了初始远程命令执行,从而阻止了随后的漏洞利用后攻击或持久性。 更多关于该漏洞在野外利用的信息可以在Unit 42威胁简报(https://unit42.paloaltonetworks.com/cve-2024-3400/)和Palo Alto Networks PSIRT博客文章(https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/)中找到。

Palo Alto Networks Security Advisories /CVE-2024-3400CVE-2024-3400 PAN-OS: Arbitrary File Creation Leads to OS Command Injection Vulnerability in GlobalProtectUrgencyHIGHESTResponse EffortMODERATERecoveryUSERValue DensityCONCENTRATEDAttack VectorNETWORKAttack ComplexityLOWAttack RequirementsNONEAutomatableYESUser InteractionNONEProduct ConfidentialityHIGHProduct IntegrityHIGHProduct AvailabilityHIGHPrivileges RequiredNONESubsequent ConfidentialityHIGHSubsequent IntegrityHIGHSubsequent AvailabilityHIGHNVDJSON Published2024-04-12 Updated2024-05-03ReferencePAN-252214Discoveredin production useDescriptionA command injection as a result of arbitrary file creation vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.Customers should continue to monitor this security advisory for the latest updates and product guidance.Product StatusVersionsAffectedUnaffectedCloud NGFW NoneAllPAN-OS 11.1< 11.1.0-h3, < 11.1.1-h1, < 11.1.2-h3>= 11.1.0-h3, >= 11.1.1-h1, >= 11.1.2-h3PAN-OS 11.0< 11.0.0-h3, < 11.0.1-h4, < 11.0.2-h4, < 11.0.3-h10, < 11.0.4-h1>= 11.0.0-h3, >= 11.0.1-h4, >= 11.0.2-h4, >= 11.0.3-h10, >= 11.0.4-h1PAN-OS 10.2< 10.2.0-h3, < 10.2.1-h2, < 10.2.2-h5, < 10.2.3-h13, < 10.2.4-h16, < 10.2.5-h6, < 10.2.6-h3, < 10.2.7-h8, < 10.2.8-h3, < 10.2.9-h1>= 10.2.0-h3, >= 10.2.1-h2, >= 10.2.2-h5, >= 10.2.3-h13, >= 10.2.4-h16, >= 10.2.5-h6, >= 10.2.6-h3, >= 10.2.7-h8, >= 10.2.8-h3, >= 10.2.9-h1PAN-OS 10.1NoneAllPAN-OS 10.0NoneAllPAN-OS 9.1NoneAllPAN-OS 9.0NoneAllPrisma Access NoneAllRequired Configuration for ExposureThis issue is applicable only to PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 firewalls configured with GlobalProtect gateway or GlobalProtect portal (or both). Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.You can verify whether you have a GlobalProtect gateway or GlobalProtect portal configured by checking for entries in your firewall web interface (Network > GlobalProtect > Gateways or Network > GlobalProtect > Portals).Severity:CRITICALCVSSv4.0Base Score:10 (CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H/AU:Y/R:U/V:C/RE:M/U:Red)Exploitation StatusPalo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.We are also aware of proof-of-concept by third parties of post-exploit persistence techniques that survive resets and upgrades. We are not aware at this time of any malicious attempts to use these persistence techniques in active exploitation of the vulnerability. These fixes listed below and Threat Prevention signatures completely prevent the initial remote command execution, stopping subsequent post-exploitation or persistence.More information about the vulnerability's exploitation in the wild can be found in the Unit 42 threat brief (https://unit42.paloaltonetworks.com/cve-2024-3400/) and the Palo Alto Networks PSIRT blog post (https://www.paloaltonetworks.com/blog/2024/04/more-on-the-pan-os-cve/).Weakness TypeCWE-77 Improper Neutralization of Special Elements used in a Command ('Command Injection')CWE-20 Improper Input ValidationSolutionWe strongly advise customers to immediately upgrade to a fixed version of PAN-OS to protect their devices even when workarounds and mitigations have been applied.This issue is fixed in PAN-OS 10.2.9-h1, PAN-OS 11.0.4-h1, PAN-OS 11.1.2-h3, and in all later PAN-OS versions. These fixes and those listed below completely prevent the initial remote command execution, stopping subsequent post-exploitation or persistence.In addition, to provide the most seamless upgrade path for customers, additional hotfixes have been made available as a courtesy for other commonly deployed maintenance releases. PAN-OS 10.2: - 10.2.9-h1 (Released 4/14/24) - 10.2.8-h3 (Released 4/15/24) - 10.2.7-h8 (Released 4/15/24) - 10.2.6-h3 (Released 4/16/24) - 10.2.5-h6 (Released 4/16/24) - 10.2.4-h16 (Released 4/18/24) - 10.2.3-h13 (Released 4/18/24) - 10.2.2-h5 (Released 4/18/24) - 10.2.1-h2 (Released 4/18/24) - 10.2.0-h3 (Released 4/18/24) PAN-OS 11.0: - 11.0.4-h1 (Released 4/14/24) - 11.0.4-h2 (Released 4/17/24) - 11.0.3-h10 (Released 4/16/24) - 11.0.2-h4 (Released 4/16/24) - 11.0.1-h4 (Released 4/18/24) - 11.0.0-h3 (Released 4/18/24) PAN-OS 11.1: - 11.1.2-h3 (Released 4/14/24) - 11.1.1-h1 (Released 4/16/24) - 11.1.0-h3 (Released 4/16/24)Note: Due to naming convention limitations, “-h” hotfix versions on Azure marketplace are instead named via addition of an extra “0”. Ex: 11.1.2-h3 is published on Azure as 11.1.203.If any exploitation was observed on a device, please take the remediation steps suggested here: https://knowledgebase.paloaltonetworks.com/KCSArticleDetail?id=kA14u000000CrO6CAKAn enhanced factory reset (EFR) procedure that does not rely on the integrity of a potentially compromised device can be scheduled by opening a case through Customer Support (TAC). This is recommended for:1. Customers who have not applied the PAN-OS fixes or Threat Prevention signatures with vulnerability protection applied to the GlobalProtect interface (regardless of level of compromise) on or before April 25, 2024; or2. Customers who are concerned about a persistent risk.Workarounds and MitigationsRecommended Mitigation: Customers with a Threat Prevention subscription can block attacks for this vulnerability using Threat IDs 95187, 95189, and 95191 (available in Applications and Threats content version 8836-8695 and later). Please monitor this advisory and new Threat Prevention content updates for additional Threat Prevention IDs around CVE-2024-3400.To apply the Threat IDs, customers must ensure that vulnerability protection has been applied to their GlobalProtect interface to prevent exploitation of this issue on their device. Please see https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184 for more information.In earlier versions of this advisory, disabling device telemetry was listed as a secondary mitigation action. Disabling device telemetry is no longer an effective mitigation. Device telemetry does not need to be enabled for PAN-OS firewalls to be exposed to attacks related to this vulnerability.AcknowledgmentsPalo Alto Networks thanks Volexity for detecting and identifying this issue, Capability Development Group at Bishop Fox for helping us improve threat prevention signatures, and Nick Wilson for sharing their research into post-exploitation persistence techniques.Frequently Asked QuestionsQ.Has this issue been exploited in the wild?Palo Alto Networks is aware of an increasing number of attacks that leverage the exploitation of this vulnerability. Proof of concepts for this vulnerability have been publicly disclosed by third parties.We are also aware of proof of concepts by third parties of post-exploit persistence techniques that survive resets and upgrades. These techniques work on a device that is already compromised with interactive root level command execution.Q.Are there any checks I can run on my device to look for evidence of attempted exploit activity?The following command can be used from the PAN-OS CLI to help identify if there was an attempted exploit activity on the device: grep pattern "failed to unmarshal session(.+.\/" mp-log gpsvc.log*If the value between "session(" and ")" does not look like a GUID, but instead contains a file system path or embedded shell commands, this could be related to an attempted exploitation of CVE-2024-3400, which will warrant further investigation to correlate with other indicators of compromise.Grep output indicating an attempted exploit may look like the following entry: failed to unmarshal session(../../some/path)Grep output indicating normal behavior will typically appear like the following entry: failed to unmarshal session(01234567-89ab-cdef-1234-567890abcdef)Q.When should I collect a Tech Support File (TSF) and forensic evidence during the upgrade process?You should obtain a TSF for forensic analysis before rebooting into a fixed version of PAN-OS. If you have already upgraded the firewall, but did not collect a TSF, some logs from the prior system installation will become inaccessible on the device. Please reach out to support if you need help investigating a prior PAN-OS installation.Q.Has my device been compromised by this vulnerability?Customers are able to open a case in the Customer Support Portal (CSP) and upload a technical support file (TSF) to determine if their device logs match known attempted exploits for this vulnerability.Q.How do I verify I applied the Threat Prevention signatures correctly?Run the following command against the GlobalProtect enabled PAN-OS 10.2+ firewall: curl -v -k -H "Cookie: SESSID=/../TESTVULN" https://&lt;target-host&gt;/global-protect/login.espIf the firewall is protected by the necessary Threat Prevention signatures, no response will be returned. A TCP reset will occur. A successful response indicates that Threat Prevention signatures are not correctly applied. Please follow the steps in https://live.paloaltonetworks.com/t5/globalprotect-articles/applying-vulnerability-protection-to-globalprotect-interfaces/ta-p/340184Q.Where can I find additional indicators of compromise for this issue?Please refer to the Unit42 Threat Brief (https://unit42.paloaltonetworks.com/cve-2024-3400/) and the Volexity blog post (https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/) for the latest information.Q.Are VMs deployed and managed by customers in the cloud impacted?While the Cloud NGFW managed services on AWS and Azure are not impacted, VM-Series managed by customers and with specific PAN-OS versions and Global Protect configurations are impacted.Timeline2024-05-03Enhanced Factory Reset (EFR) Procedure is Available Against any Potential Post-Exploit Persistence Techniques.2024-05-01Answered a FAQ about how to verify the fix or threat prevention signature was applied correctly2024-04-29Updated exploitation status about proof-of-concept by third parties of post-exploit persistence techniques2024-04-25Added link to KB article for remediating a device2024-04-20Answered a FAQ about Tech Support File collection and forensic evidence2024-04-19Added reference to PSIRT blog post about CVE-2024-34002024-04-19Clarified vulnerability title and description2024-04-17Clarified FAQ regarding evidence of attempted exploit activity2024-04-17Added new Threat Prevention Threat ID to Workarounds and Mitigations2024-04-17Added a CLI command to search for possible attempts of exploit activity2024-04-16Updated product and mitigation guidance, exploit status, and PAN-OS fix availability2024-04-15All necessary PAN-OS fixes are now available, clarified Workarounds and Mitigations when using Panorama templates2024-04-14Clarified impact on GlobalProtect portal configurations2024-04-13Added link to Unit42 threat brief and clarified impact to customer-managed VMs in the cloud2024-04-12Initial publication

Fish AI Reader

Fish AI Reader

AI辅助创作,多种专业模板,深度分析,高质量内容生成。从观点提取到深度思考,FishAI为您提供全方位的创作支持。新版本引入自定义参数,让您的创作更加个性化和精准。

FishAI

FishAI

鱼阅,AI 时代的下一个智能信息助手,助你摆脱信息焦虑

联系邮箱 441953276@qq.com

相关标签

Palo Alto Networks PAN-OS GlobalProtect 命令注入 漏洞
相关文章