UnAuthenticated SQL Injection Vulnerability in Palo Alto Networks Expedition

CVE-2024-9465
9.1CRITICAL

Key Information

Status
Expedition
Vendor
CVE Published:
9 October 2024

Badges

👾 Exploit Exists🔴 Public PoC🟣 EPSS 94%📰 News Worthy

Summary

The articles discuss critical security vulnerabilities in various products from different vendors. The vulnerability in Palo Alto Networks Expedition allows unauthenticated attackers to reveal database contents, create and read arbitrary files, and execute arbitrary OS commands, potentially leading to the compromise of sensitive information and system control. Similarly, the Fortinet flaw in FortiOS, FortiPAM, FortiProxy, and FortiWeb results in remote code execution, while the Cisco Nexus Dashboard Fabric Controller flaw permits command execution attacks. All these vulnerabilities have high CVSS scores and are under active exploitation, prompting urgent security patches from the respective vendors. While there is no evidence of exploitation of the Palo Alto Networks Expedition vulnerabilities, steps to reproduce the problem are in the public domain, and it is recommended to limit access to authorized users and networks. These vulnerabilities pose significant risks, including data breaches and system compromise, highlighting the importance of timely patching and security measures.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2024-9465 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

Expedition < 1.2.96

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

EPSS Score

94% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • First article discovered by The Hacker News

  • 👾

    Exploit exists.

  • Initial publication

  • Vulnerability published.

Collectors

NVD DatabaseMitre DatabaseCISA Database1 Proof of Concept(s)4 News Article(s)

Credit

Zach Hanley (@hacks_zach) of Horizon3.ai
Enrique Castillo of Palo Alto Networks
.