UnAuthenticated SQL Injection Vulnerability in Palo Alto Networks Expedition

CVE-2024-9465
9.1CRITICAL

Key Information

Status
Expedition
Vendor
CVE Published:
9 October 2024

Badges

👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The articles discuss critical security vulnerabilities in various products from different vendors. The vulnerability in Palo Alto Networks Expedition allows unauthenticated attackers to reveal database contents, create and read arbitrary files, and execute arbitrary OS commands, potentially leading to the compromise of sensitive information and system control. Similarly, the Fortinet flaw in FortiOS, FortiPAM, FortiProxy, and FortiWeb results in remote code execution, while the Cisco Nexus Dashboard Fabric Controller flaw permits command execution attacks. All these vulnerabilities have high CVSS scores and are under active exploitation, prompting urgent security patches from the respective vendors. While there is no evidence of exploitation of the Palo Alto Networks Expedition vulnerabilities, steps to reproduce the problem are in the public domain, and it is recommended to limit access to authorized users and networks. These vulnerabilities pose significant risks, including data breaches and system compromise, highlighting the importance of timely patching and security measures.

Affected Version(s)

Expedition < 1.2.96

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
9.1
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • First article discovered by The Hacker News

  • 👾

    Exploit exists.

  • Initial publication

  • Vulnerability published.

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)1 News Article(s)

Credit

Zach Hanley (@hacks_zach) of Horizon3.ai
Enrique Castillo of Palo Alto Networks
.