Skip to content

Python script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts

License

Notifications You must be signed in to change notification settings

swaybs/CVE-2024-3400

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

6 Commits
 
 
 
 
 
 
 
 

Repository files navigation

PAN-OS CVE-2024-3400 Check

Overview

[FOR INTERNAL USE ONLY]

This script checks for evidence of the CVE-2024-3400 PAN-OS exploit on Palo Alto Networks firewalls.

CVE: https://security.paloaltonetworks.com/CVE-2024-3400
IOCs: https://otx.alienvault.com/pulse/66198c3b58d2dd2ad4043bc6/

Requirements

  • Python 3.6+
  • netmiko library
  • tqdm library

Installation

  1. Clone the repository: git clone https://github.com/swaybs/CVE-2024-3400.git
  2. Navigate to the project directory: cd cve-2024-3400
  3. Install the dependencies using pip: pip install -r requirements.txt

Usage

  1. Edit the script to replace the placeholder values with your actual firewall credentials and command to run.
  2. Run the script: python check_cve.py

Releases

No releases published

Packages

No packages published

Languages