Exploited
CWE
306
EPSS
0.043%
Advisory Published
CVE Published
Advisory Published
Updated

CVE-2024-5910: Expedition: Missing Authentication Leads to Admin Account Takeover (Severity: CRITICAL)

First published: Wed Jul 10 2024(Updated: )

Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.

Credit: psirt@paloaltonetworks.com psirt@paloaltonetworks.com

Affected SoftwareAffected VersionHow to fix
Palo Alto Networks Expedition<1.2.92=1.2
1.2.92
Palo Alto Networks Expedition>=1.2.0<1.2.92
Palo Alto Networks Expedition

Remedy

This issue is fixed in Expedition 1.2.92 and all later versions.

Remedy

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Remedy

Ensure network access to Expedition is restricted to authorized users, hosts, or networks.

Never miss a vulnerability like this again

Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.

Frequently Asked Questions

  • What is the severity of CVE-2024-5910?

    CVE-2024-5910 is considered a critical vulnerability due to its potential to allow attackers to gain unauthorized access to an Expedition admin account.

  • How do I fix CVE-2024-5910?

    To fix CVE-2024-5910, upgrade your Palo Alto Networks Expedition to version 1.2.92 or later.

  • What kind of attacks can CVE-2024-5910 enable?

    CVE-2024-5910 can enable attackers with network access to take over the Expedition admin account, compromising the configuration management system.

  • What versions of Palo Alto Networks Expedition are affected by CVE-2024-5910?

    CVE-2024-5910 affects all versions of Palo Alto Networks Expedition from 1.2.0 up to but not including 1.2.92.

  • Do I need to implement any additional security measures after updating for CVE-2024-5910?

    It is recommended to review and enhance overall security practices in addition to updating to mitigate risks associated with CVE-2024-5910.

Contact

SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.co
By using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203