First published: Wed Oct 09 2024(Updated: )
An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Expedition | >=1.2.0<1.2.96 |
The fixes for all listed issues are available in Expedition 1.2.96, and all later Expedition versions. All Expedition usernames, passwords, and API keys should be rotated after upgrading to the fixed version of Expedition. All firewall usernames, passwords, and API keys processed by Expedition should be rotated after updating.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9464 is considered a critical vulnerability due to its potential to allow authenticated attackers to execute arbitrary OS commands as root.
To fix CVE-2024-9464, upgrade Palo Alto Networks Expedition to a version beyond 1.2.96.
CVE-2024-9464 can lead to the disclosure of sensitive information, including usernames, passwords, and device configurations.
CVE-2024-9464 affects authenticated users of Palo Alto Networks Expedition versions between 1.2.0 and 1.2.96.
CVE-2024-9464 requires authentication, so it cannot be exploited remotely without valid user credentials.