Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection

Detects potential exploitation attempts of CVE-2024-3400 - an OS command injection in Palo Alto GlobalProtect. This detection looks for suspicious strings that indicate a potential directory traversal attempt or command injection.

Sigma rule (View on GitHub)

 1title: Potential CVE-2024-3400 Exploitation - Palo Alto GlobalProtect OS Command Injection
 2id: f130a5f1-73ba-42f0-bf1e-b66a8361cb8f
 3status: test
 4description: |
 5    Detects potential exploitation attempts of CVE-2024-3400 - an OS command injection in Palo Alto GlobalProtect.
 6    This detection looks for suspicious strings that indicate a potential directory traversal attempt or command injection.    
 7references:
 8    - https://security.paloaltonetworks.com/CVE-2024-3400
 9    - https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/
10    - https://attackerkb.com/topics/SSTk336Tmf/cve-2024-3400/rapid7-analysis
11author: Nasreddine Bencherchali (Nextron Systems)
12date: 2024-04-18
13modified: 2024-04-25
14tags:
15    - attack.initial-access
16    - attack.persistence
17    - attack.privilege-escalation
18    - attack.defense-evasion
19    - cve.2024-3400
20    - detection.emerging-threats
21logsource:
22    category: appliance
23    product: paloalto
24    service: globalprotect
25    definition: 'Requirements: Palo Alto GlobalProtect "mp-log" and "gpsvc.log" log files need to be ingested'
26detection:
27    keywords_generic:
28        - 'failed to unmarshal session(../'
29        - 'failed to unmarshal session(./../'
30        - 'failed to unmarshal session(/..'
31        - 'failed to unmarshal session(%2E%2E%2F'
32        - 'failed to unmarshal session(%2F%2E%2E'
33        - 'failed to unmarshal session(%2E%2F%2E%2E%2F'
34        - 'failed to unmarshal session(%252E%252E%252F'
35        - 'failed to unmarshal session(%252F%252E%252E'
36        - 'failed to unmarshal session(%252E%252F%252E%252E%252F'
37    keywords_telemetry_exploit:
38        - '{IFS}'
39        - 'base64'
40        - 'bash'
41        - 'curl'
42        - 'http'
43    keywords_telemetry_path:
44        - '/opt/panlogs/tmp/device_telemetry/'
45    condition: keywords_generic or all of keywords_telemetry_*
46falsepositives:
47    - Unknown
48level: high

References

Related rules

to-top