You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
PAN-OS Firewall is a popular firewall with more than 40K instances on the internet.
the exploit is easy to trigger it is a simple post request.
due to active exploitation, I think it is better to let me write a plugin for this vulnerability as soon as possible.
Thanks for your request! This vulnerability is in scope for the reward program. Please submit our participation form and you can start working on the development.
Please keep in mind that the Tsunami Scanner Team will only be able to work at one issue at a time for each participant so please hold on the implementation work for any other requests you might have.
PAN-OS Firewall is a popular firewall with more than 40K instances on the internet.
the exploit is easy to trigger it is a simple post request.
due to active exploitation, I think it is better to let me write a plugin for this vulnerability as soon as possible.
https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/
https://socradar.io/critical-os-command-injection-vulnerability-in-palo-altos-globalprotect-gateway-cve-2024-3400-the-patch-is-not-available-yet/
The text was updated successfully, but these errors were encountered: