First published: Wed Jul 10 2024(Updated: )
Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.
Credit: psirt@paloaltonetworks.com psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Expedition | <1.2.92=1.2 | 1.2.92 |
Palo Alto Networks Expedition | >=1.2.0<1.2.92 | |
Palo Alto Networks Expedition |
This issue is fixed in Expedition 1.2.92 and all later versions.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Ensure network access to Expedition is restricted to authorized users, hosts, or networks.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-5910 is considered a critical vulnerability due to its potential to allow attackers to gain unauthorized access to an Expedition admin account.
To fix CVE-2024-5910, upgrade your Palo Alto Networks Expedition to version 1.2.92 or later.
CVE-2024-5910 can enable attackers with network access to take over the Expedition admin account, compromising the configuration management system.
CVE-2024-5910 affects all versions of Palo Alto Networks Expedition from 1.2.0 up to but not including 1.2.92.
It is recommended to review and enhance overall security practices in addition to updating to mitigate risks associated with CVE-2024-5910.