![](https://blogger.googleusercontent.com/img/b/R29vZ2xl/AVvXsEhFk2Gn7nORhsJaYtMIldc0KGin9sMytX05vZYuVfTKPE0ObMQHdxbUUIoS7FJZ2W3MNxttaUOlHj5zq3TJWgwE172SNNbbrRk15q_VXL1cEGlLFRPA91tXwaz65jzO11j7Ij7S7kKLua_7hG38Ai1C8knxtAffOcsNFvwip9-Z0-QsUOl4Hu6-UnWKh1Dv/s1600/palo-alto-networks.png)
Palo Alto Networks has released hotfixes to address a maximum-severity security flaw impacting PAN-OS software that has come under active exploitation in the wild.
Tracked as CVE-2024-3400 (CVSS score: 10.0), the critical vulnerability is a case of command injection in the GlobalProtect feature that an unauthenticated attacker could weaponize to execute arbitrary code with root
Source:: The Hackers News