{"id":4066,"date":"2024-04-15T10:03:51","date_gmt":"2024-04-15T07:03:51","guid":{"rendered":"https:\/\/www.govcert.bg\/?p=4066"},"modified":"2024-04-16T14:57:49","modified_gmt":"2024-04-16T11:57:49","slug":"palo-alto-networks-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%bf%d1%80%d0%b5%d0%bf%d0%be%d1%80%d1%8a%d0%ba%d0%b8-%d0%b7%d0%b0-%d1%83%d1%8f%d0%b7%d0%b2%d0%b8%d0%bc%d0%be%d1%81%d1%82","status":"publish","type":"post","link":"https:\/\/www.govcert.bg\/en\/warnings\/palo-alto-networks-%d0%bf%d1%83%d0%b1%d0%bb%d0%b8%d0%ba%d1%83%d0%b2%d0%b0-%d0%bf%d1%80%d0%b5%d0%bf%d0%be%d1%80%d1%8a%d0%ba%d0%b8-%d0%b7%d0%b0-%d1%83%d1%8f%d0%b7%d0%b2%d0%b8%d0%bc%d0%be%d1%81%d1%82\/","title":{"rendered":"Palo Alto Networks Releases Guidance for Vulnerability in PAN-OS, CVE-2024-3400"},"content":{"rendered":"<p style=\"text-align: justify;\"><a href=\"https:\/\/www.cisa.gov\/news-events\/alerts\/2024\/04\/12\/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400\">Palo Alto Networks<\/a> has released workaround guidance for a command injection vulnerability (CVE-2024-3400) affecting PAN-OS versions 10.2, 11.0, and 11.1. Palo Alto Networks has reported active exploitation of this vulnerability in the wild.<\/p>\n<p>CVE-2024-3400 (CVSS v4.0 Score 10.0) \u0437\u0430\u0441\u044f\u0433\u0430 firewall-\u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0438\u0440\u0430\u043d\u0438 \u0441 GlobalProtect gateway \u0438\/\u0438\u043b\u0438 GlobalProtect portal, \u0438 \u0438\u043c\u0430\u0442 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u044f.<\/p>\n<p style=\"text-align: justify;\"><strong>CERT Bulgaria<\/strong> encourages users and administrators to review <a href=\"https:\/\/security.paloaltonetworks.com\/CVE-2024-3400\">Palo Alto Networks Security Advisory<\/a>apply the current mitigations, and update the affected software.<\/p>","protected":false},"excerpt":{"rendered":"<p>Palo Alto Networks \u043f\u0443\u0431\u043b\u0438\u043a\u0443\u0432\u0430 \u043f\u0440\u0435\u043f\u043e\u0440\u044a\u043a\u0438 \u0437\u0430 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442 CVE-2024-3400, \u0437\u0430\u0441\u044f\u0433\u0430\u0449\u0430 PAN-OS \u0432\u0435\u0440\u0441\u0438\u0438 10.2, 11.0 \u0438 11.1. CVE-2024-3400 (CVSS v4.0 Score 10.0) \u0437\u0430\u0441\u044f\u0433\u0430 firewall-\u0438 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0438\u0440\u0430\u043d\u0438 \u0441 GlobalProtect gateway \u0438\/\u0438\u043b\u0438 GlobalProtect portal, \u0438 \u0438\u043c\u0430\u0442 \u0432\u043a\u043b\u044e\u0447\u0435\u043d\u0430 \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u044f. CERT \u0411\u044a\u043b\u0433\u0430\u0440\u0438\u044f \u043f\u0440\u0435\u043f\u043e\u0440\u044a\u0447\u0432\u0430 \u043f\u043e\u0442\u0440\u0435\u0431\u0438\u0442\u0435\u043b\u0438\u0442\u0435 \u0438 \u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0438\u0442\u0435 \u0434\u0430 \u0441\u0435 \u0437\u0430\u043f\u043e\u0437\u043d\u0430\u044f\u0442 \u0441 \u043f\u0440\u0435\u043f\u043e\u0440\u044a\u043a\u0438\u0442\u0435 \u0437\u0430 \u0441\u0438\u0433\u0443\u0440\u043d\u043e\u0441\u0442 \u043d\u0430 Palo Alto Networks, \u0434\u0430 \u043f\u0440\u0438\u043b\u043e\u0436\u0430\u0442 \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u0438\u0442\u0435 \u0430\u043a\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438.<\/p>","protected":false},"author":6,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[44],"tags":[],"class_list":["post-4066","post","type-post","status-publish","format-standard","hentry","category-warnings"],"_links":{"self":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4066","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/users\/6"}],"replies":[{"embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/comments?post=4066"}],"version-history":[{"count":4,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4066\/revisions"}],"predecessor-version":[{"id":4077,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/posts\/4066\/revisions\/4077"}],"wp:attachment":[{"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/media?parent=4066"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/categories?post=4066"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.govcert.bg\/en\/wp-json\/wp\/v2\/tags?post=4066"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}