<?xml version="1.0" encoding="UTF-8" ?>
<?xml-stylesheet type="text/xsl" href="https://community.appian.com/cfs-file/__key/system/syndication/rss.xsl" media="screen"?><rss version="2.0" xmlns:dc="http://purl.org/dc/elements/1.1/"><channel><title>KB-2301 Information about the PAN-OS Global Protect Command Injection Vulnerability (CVE-2024-3400)</title><link>https://community.appian.com/support/w/kb/3527/kb-2301-information-about-the-pan-os-global-protect-command-injection-vulnerability-cve-2024-3400</link><description /><dc:language>en-US</dc:language><generator>Telligent Community 12</generator><item><title>KB-2301 Information about the PAN-OS Global Protect Command Injection Vulnerability (CVE-2024-3400)</title><link>https://community.appian.com/support/w/kb/3527/kb-2301-information-about-the-pan-os-global-protect-command-injection-vulnerability-cve-2024-3400</link><pubDate>Mon, 15 Apr 2024 18:24:00 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:47063719-c392-4640-9daa-f79a327a15fa</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3527/kb-2301-information-about-the-pan-os-global-protect-command-injection-vulnerability-cve-2024-3400#comments</comments><description>Current Revision posted to Appian Knowledge Base by pauline.delacruz on 4/15/2024 6:24:00 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 12-Apr-2024, Palo Alto Networks released a &lt;/span&gt;&lt;a href="https://security.paloaltonetworks.com/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; regarding a command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software. The same day, CISA released a concurrent &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; and added the vulnerability to its Known Exploited Vulnerability Catalog.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by this vulnerability. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-3400&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;Palo Alto Networks PAN-OS Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://security.paloaltonetworks.com/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;https://security.paloaltonetworks.com/CVE-2024-3400&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;April 15, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2301 Information about the PAN-OS Global Protect Command Injection Vulnerability (CVE-2024-3400)</title><link>https://community.appian.com/support/w/kb/3527/kb-2301-information-about-the-pan-os-global-protect-command-injection-vulnerability-cve-2024-3400/revision/2</link><pubDate>Mon, 15 Apr 2024 18:23:50 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:47063719-c392-4640-9daa-f79a327a15fa</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3527/kb-2301-information-about-the-pan-os-global-protect-command-injection-vulnerability-cve-2024-3400#comments</comments><description>Revision 2 posted to Appian Knowledge Base by pauline.delacruz on 4/15/2024 6:23:50 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 12-Apr-2024, Palo Alto Networks released a &lt;/span&gt;&lt;a href="https://security.paloaltonetworks.com/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; regarding a command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software. The same day, CISA released a concurrent &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; and added the vulnerability to its Known Exploited Vulnerability Catalog.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by this vulnerability. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-3400&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;Palo Alto Networks PAN-OS Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/h2&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://security.paloaltonetworks.com/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;https://security.paloaltonetworks.com/CVE-2024-3400&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;br /&gt;&lt;span style="font-weight:400;"&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;April 15, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;

&lt;div style="font-size: 90%;"&gt;Tags: Security&lt;/div&gt;
</description></item><item><title>KB-2301 Information about the PAN-OS Global Protect Command Injection Vulnerability (CVE-2024-3400)</title><link>https://community.appian.com/support/w/kb/3527/kb-2301-information-about-the-pan-os-global-protect-command-injection-vulnerability-cve-2024-3400/revision/1</link><pubDate>Mon, 15 Apr 2024 18:21:50 GMT</pubDate><guid isPermaLink="false">d3a83456-d57b-489c-a84c-4e8267bb592a:47063719-c392-4640-9daa-f79a327a15fa</guid><dc:creator>pauline.delacruz</dc:creator><comments>https://community.appian.com/support/w/kb/3527/kb-2301-information-about-the-pan-os-global-protect-command-injection-vulnerability-cve-2024-3400#comments</comments><description>Revision 1 posted to Appian Knowledge Base by pauline.delacruz on 4/15/2024 6:21:50 PM&lt;br /&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;On 12-Apr-2024, Palo Alto Networks released a &lt;/span&gt;&lt;a href="https://security.paloaltonetworks.com/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; regarding a command injection vulnerability in the GlobalProtect feature of Palo Alto Networks PAN-OS software. The same day, CISA released a concurrent &lt;/span&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;security advisory&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt; and added the vulnerability to its Known Exploited Vulnerability Catalog.&lt;/span&gt;&lt;/p&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Upon assessing the Appian platform against all details of the CVE, we can confirm that the Appian platform is not impacted by this vulnerability. We will continue to monitor the situation and provide any updates as appropriate.&lt;/span&gt;&lt;/p&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Additional Notes:&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;The following CVE was released with additional information on the scope of the vulnerability:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://nvd.nist.gov/vuln/detail/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;CVE-2024-3400&lt;/span&gt;&lt;/a&gt; &lt;span style="font-weight:400;"&gt;(&amp;ldquo;Palo Alto Networks PAN-OS Command Injection Vulnerability&amp;rdquo;)&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;Supporting Documentation:&lt;/span&gt;&lt;/p&gt;
&lt;ul&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://security.paloaltonetworks.com/CVE-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;https://security.paloaltonetworks.com/CVE-2024-3400&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&amp;nbsp;&lt;/span&gt;&lt;/li&gt;
&lt;li style="font-weight:400;"&gt;&lt;a href="https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400"&gt;&lt;span style="font-weight:400;"&gt;https://www.cisa.gov/news-events/alerts/2024/04/12/palo-alto-networks-releases-guidance-vulnerability-pan-os-cve-2024-3400&lt;/span&gt;&lt;/a&gt;&lt;span style="font-weight:400;"&gt;&lt;br /&gt;&lt;/span&gt;&lt;/li&gt;
&lt;/ul&gt;
&lt;h2&gt;&lt;span style="font-weight:400;"&gt;Affected Versions&lt;/span&gt;&lt;/h2&gt;
&lt;p&gt;&lt;span style="font-weight:400;"&gt;This article applies to all supported versions of Appian.&lt;/span&gt;&lt;br /&gt;&lt;span style="font-weight:400;"&gt;Last reviewed:&amp;nbsp;&lt;/span&gt;&lt;span style="font-weight:400;"&gt;Apr 15, 2024&lt;/span&gt;&lt;/p&gt;&lt;div style="clear:both;"&gt;&lt;/div&gt;
</description></item></channel></rss>