OS Command Injection Vulnerability in Palo Alto Networks Expedition
CVE-2024-9464
Key Information:
- Vendor
- Palo Alto Networks
- Status
- Vendor
- CVE Published:
- 9 October 2024
Badges
What is CVE-2024-9464?
CVE-2024-9464 is a critical vulnerability found in Palo Alto Networks Expedition, a tool used for managing and optimizing the configuration of Palo Alto Networks' firewall products. This vulnerability enables an authenticated attacker to perform OS command injection, which could allow them to execute arbitrary commands as root. This exploitation could have serious consequences for organizations, including the potential exposure of sensitive information such as usernames, cleartext passwords, device configurations, and API keys used to manage PAN-OS firewalls.
Technical Details
The vulnerability exists due to improper input validation within Palo Alto Networks Expedition, which can be leveraged by attackers with authenticated access. By exploiting this flaw, an attacker can craft specific inputs that the system fails to properly sanitize, leading to the execution of arbitrary commands. The exploitation can occur without the need to escalate privileges, as access is granted to the root level within the application context.
Impact of the Vulnerability
-
Data Exposure: Successful exploitation can lead to the unauthorized disclosure of sensitive information, including usernames, passwords, and device configurations, which may be vital for maintaining secure network operations.
-
Compromise of Security Credentials: With access to API keys and cleartext passwords, attackers could potentially gain further access to network resources and management interfaces, escalating the risk of a full security breach.
-
System Integrity Risks: The ability to execute arbitrary OS commands as root can allow attackers to alter or degrade the integrity of the affected systems, potentially leading to system malfunctions, further exploitation, or even additional attacks within the organization's network.
Affected Version(s)
Expedition 1.2.0 < 1.2.96
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
CISA warns of more Palo Alto Networks bugs exploited in attacks
CISA warned today that two more critical security vulnerabilities in Palo Alto Networks' Expedition migration tool are now actively exploited in attacks.
2 months ago
Palo Alto Networks warns of potential PAN-OS RCE vulnerability
Palo Alto Networks warned customers to restrict access to their next-generation firewalls because of a potential remote code execution vulnerability in the PAN-OS management interface.
2 months ago
References
CVSS V3.1
Timeline
- π
Vulnerability started trending
- π‘
Public PoC available
- πΎ
Exploit known to exist
- π°
First article discovered by BleepingComputer
Vulnerability published