// soc investigation 2026-02-08
SOC274 Palo Alto Networks PAN-OS Command Injection Vulnerability Exploitation (CVE-2024-3400)
letsdefend critical closed ✓ true positive
mitre/T1190 mitre/T1059 mitre/T1505-003
analyst verdict TRUE POSITIVE

ALERT SUMMARY

MITRE ATTCK
T1190 Exploit Public Facing Application
T1059 Command and Scripting Interpreter
T1059.004 Unix Shell
T1505.003 Web Shell

WHO
External attacker from IP 144.172.79.92 targeted PA-Firewall-01 at 172.16.17.139
Source IP flagged as malicious on VirusTotal

WHAT
Command injection exploit targeting Palo Alto PAN OS vulnerability CVE 2024 3400
Malicious cookie used to inject shell command
Payload attempted to execute curl command to attacker controlled server

WHEN
Apr 18 2024 03 09 AM

WHERE
PA-Firewall-01 Global Protect login endpoint
/global-protect/login.esp
Device telemetry directory under /opt/panlogs/tmp/device_telemetry

WHY
Attacker attempted remote command execution via command injection vulnerability
Goal was to force firewall to curl back to attacker IP and exfiltrate system information

HOW
Malicious SESSID cookie contained directory traversal and shell injection
Cookie value included curl command with whoami execution
Logs confirm dt_send process attempted to send file using injected filename
Outbound connection observed to attacker IP 144.172.79.92
Curl execution failed due to DNS lookup error but command execution attempt confirmed

IMPACT
Confirmed exploitation attempt of PAN OS command injection vulnerability
Firewall executed injected command
Outbound connection to malicious IP observed
High likelihood firewall compromise

ACTION TAKEN
Escalated as confirmed compromise
Recommend immediate isolation of firewall management interface
Block attacker IP at perimeter
Rotate credentials and API keys
Check for persistence mechanisms and unauthorized admin accounts
Upgrade PAN OS to patched version
Conduct full forensic review

CVE-2024-3400 is an unauthenticated command injection flaw in PAN-OS where a crafted request allows attackers to inject shell commands that get executed as root through the device telemetry component.”