Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability

Posted on September 30, 2025September 30, 2025 By CWS

Safety researchers are observing a major enhance in internet-wide scans concentrating on the vital PAN-OS GlobalProtect vulnerability (CVE-2024-3400). 

Exploit makes an attempt have surged as attackers search to leverage an arbitrary file creation flaw to realize OS command injection and finally full root code execution on weak firewalls.

Exploitation of Essential PAN-OS SSL VPN Flaw (CVE-2024-3400)

Since late September 2025, honeypots deployed globally have logged hundreds of TCP connections probing PAN-OS SSL VPN portals. 

SANS Expertise Institute noticed that one distinguished supply IP, 141.98.82.26, has repeatedly issued malicious POST requests to the /ssl-vpn/hipreport.esp endpoint, exploiting the shortage of session ID validation. The attacker provides a crafted Cookie header:

If the add succeeds, a follow-up GET request for /global-protect/portal/photos/evil.txt will return HTTP/403, confirming file presence. 

Attackers then pivot file placement to directories, permitting command execution. These automated scans mirror the excessive CVSS 10.0 severity and network-accessible, unauthenticated assault vector of CVE-2024-3400.

Threat FactorsDetailsAffected ProductsPAN-OS 10.2 variations earlier than 10.2.9-h1, 11.0 variations earlier than 11.0.4-h1, 11.1 variations earlier than 11.1.2-h3  (with GlobalProtect gateway or portal enabled)ImpactArbitrary file creation resulting in OS command injection and root code executionExploit PrerequisitesNone (network-accessible, unauthenticated)CVSS 3.1 Score10. 0 (Essential)

Mitigations

Palo Alto Networks has launched fastened PAN-OS variations—10.2.9-h1, 11.0.4-h1, 11.1.2-h3—and new hotfixes for affected branches. 

A right away improve is strongly suggested to thwart ongoing exploitation. Directors can even deploy Menace Prevention signatures 95187, 95189, and 95191 to dam the preliminary arbitrary file creation interplay on the GlobalProtect interface.

For detection, operators ought to grep GPSvc logs for anomalous session ID strings:

Professional GUID patterns seem as hex-digit teams; any file-system path or shell snippet between classes ( and ) signifies exploitation makes an attempt. 

A timeline of updates reveals that enhanced manufacturing unit reset (EFR) procedures and CLI instructions for proof assortment had been revealed between April and Could 2024, underscoring the continuing remediation efforts.

Cloud NGFW and Prisma Entry prospects usually are not affected; solely on-premises PAN-OS 10.2–11.1 gadgets with GlobalProtect gateway or portal enabled are in danger. 

Organizations ought to confirm configuration by way of the firewall GUI below Community > GlobalProtect > Gateways/Portals and audit for unauthorized recordsdata in /var/appweb/sslvpndocs.

As menace actors proceed to weaponize CVE-2024-3400, vigilant patch administration, proactive log inspection, and strong Menace Prevention enforcement stay vital to defend towards unauthorized root-level entry.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Alto, Exploit, Global, Hackers, Networks, Palo, PANOS, Protect, Scanning, Vulnerability

Post navigation

Previous Post: Linux 6.17 Released With Fix for use-after-free Vulnerabilities
Next Post: Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web

Related Posts

Atomic macOS Info-Stealer Upgraded With New Backdoor to Maintain Persistence Cyber Security News
New Frontiers In Identity-Based Access Control Cyber Security News
CNCERT Accuses of US Intelligence Agencies Attacking Chinese Military-Industrial Units Cyber Security News
28,000 Microsoft Exchange Servers Vulnerable to CVE-2025-53786 Exposed Online Cyber Security News
Google Down For Most Of The Users In Turkey And Eastern Europe Cyber Security News
Google Chrome May Soon Turn Webpages Into Podcasts With AI Audio Overviews Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Microsoft Warns of Hackers Abuse Teams Features and Capabilities to Deliver Malware
  • Why Threat Prioritization Is the Key SOC Performance Driver  
  • BK Technologies Data Breach – Hackers Compromise IT Systems and Exfiltrate Data
  • BatShadow Group Uses New Go-Based ‘Vampire Bot’ Malware to Hunt Job Seekers
  • Google’s New AI Doesn’t Just Find Vulnerabilities — It Rewrites Code to Patch Them

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News