First published: Wed Dec 12 2018(Updated: )
The Palo Alto Networks Expedition Migration tool 1.0.107 and earlier may allow an unauthenticated attacker with remote access to run system level commands on the device hosting this service/application.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Expedition | =1.0.107 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-10143 has a high severity rating due to its potential for unauthenticated remote command execution.
To fix CVE-2018-10143, update the Palo Alto Networks Expedition tool to version 1.0.108 or later.
CVE-2018-10143 is primarily associated with command injection vulnerabilities that allow system-level commands to be executed.
Users of Palo Alto Networks Expedition version 1.0.107 and earlier are affected by CVE-2018-10143.
An attacker exploiting CVE-2018-10143 can run arbitrary system-level commands on the device hosting the Expedition tool.