Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability

Hackers Actively Scanning to Exploit Palo Alto Networks PAN-OS Global Protect Vulnerability

Posted on September 30, 2025September 30, 2025 By CWS

Safety researchers are observing a major enhance in internet-wide scans concentrating on the vital PAN-OS GlobalProtect vulnerability (CVE-2024-3400). 

Exploit makes an attempt have surged as attackers search to leverage an arbitrary file creation flaw to realize OS command injection and finally full root code execution on weak firewalls.

Exploitation of Essential PAN-OS SSL VPN Flaw (CVE-2024-3400)

Since late September 2025, honeypots deployed globally have logged hundreds of TCP connections probing PAN-OS SSL VPN portals. 

SANS Expertise Institute noticed that one distinguished supply IP, 141.98.82.26, has repeatedly issued malicious POST requests to the /ssl-vpn/hipreport.esp endpoint, exploiting the shortage of session ID validation. The attacker provides a crafted Cookie header:

If the add succeeds, a follow-up GET request for /global-protect/portal/photos/evil.txt will return HTTP/403, confirming file presence. 

Attackers then pivot file placement to directories, permitting command execution. These automated scans mirror the excessive CVSS 10.0 severity and network-accessible, unauthenticated assault vector of CVE-2024-3400.

Threat FactorsDetailsAffected ProductsPAN-OS 10.2 variations earlier than 10.2.9-h1, 11.0 variations earlier than 11.0.4-h1, 11.1 variations earlier than 11.1.2-h3  (with GlobalProtect gateway or portal enabled)ImpactArbitrary file creation resulting in OS command injection and root code executionExploit PrerequisitesNone (network-accessible, unauthenticated)CVSS 3.1 Score10. 0 (Essential)

Mitigations

Palo Alto Networks has launched fastened PAN-OS variations—10.2.9-h1, 11.0.4-h1, 11.1.2-h3—and new hotfixes for affected branches. 

A right away improve is strongly suggested to thwart ongoing exploitation. Directors can even deploy Menace Prevention signatures 95187, 95189, and 95191 to dam the preliminary arbitrary file creation interplay on the GlobalProtect interface.

For detection, operators ought to grep GPSvc logs for anomalous session ID strings:

Professional GUID patterns seem as hex-digit teams; any file-system path or shell snippet between classes ( and ) signifies exploitation makes an attempt. 

A timeline of updates reveals that enhanced manufacturing unit reset (EFR) procedures and CLI instructions for proof assortment had been revealed between April and Could 2024, underscoring the continuing remediation efforts.

Cloud NGFW and Prisma Entry prospects usually are not affected; solely on-premises PAN-OS 10.2–11.1 gadgets with GlobalProtect gateway or portal enabled are in danger. 

Organizations ought to confirm configuration by way of the firewall GUI below Community > GlobalProtect > Gateways/Portals and audit for unauthorized recordsdata in /var/appweb/sslvpndocs.

As menace actors proceed to weaponize CVE-2024-3400, vigilant patch administration, proactive log inspection, and strong Menace Prevention enforcement stay vital to defend towards unauthorized root-level entry.

Observe us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Actively, Alto, Exploit, Global, Hackers, Networks, Palo, PANOS, Protect, Scanning, Vulnerability

Post navigation

Previous Post: Researchers Disclose Google Gemini AI Flaws Allowing Prompt Injection and Cloud Exploits
Next Post: Threat Actors Allegedly Listed Veeam RCE Exploit for Sale on Dark Web

Related Posts

Cisco Unified Contact Center Express Vulnerabilities Enables Remote Code Execution Attacks Cisco Unified Contact Center Express Vulnerabilities Enables Remote Code Execution Attacks Cyber Security News
VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes VirtualBox 7.2 Released With Support for Windows 11/Arm VMs and Bug Fixes Cyber Security News
Microsoft Announces New Security Defaults for Windows 365 Cloud PCs Microsoft Announces New Security Defaults for Windows 365 Cloud PCs Cyber Security News
UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia UAT-7290 Hackers Attacking Critical Infrastructure Entities in South Asia Cyber Security News
LocalGPT: Secure AI Assistant Built with Rust LocalGPT: Secure AI Assistant Built with Rust Cyber Security News
LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization LangGraph Vulnerability Allows Malicious Python Code Execution During Deserialization Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Muddled Libra Exploits VMware vSphere in Cyber Attack
  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News