First published: Wed Oct 09 2024(Updated: )
A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Palo Alto Networks Expedition | >=1.2.0<1.2.96 |
The fixes for all listed issues are available in Expedition 1.2.96, and all later Expedition versions. The affected cleartext file will be removed automatically during the upgrade. All Expedition usernames, passwords, and API keys should be rotated after upgrading to the fixed version of Expedition. All firewall usernames, passwords, and API keys processed by Expedition should be rotated after updating.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-9466 has been rated as a high severity vulnerability due to the risk of exposing sensitive credentials.
To fix CVE-2024-9466, upgrade Palo Alto Networks Expedition to version 1.2.96 or later.
CVE-2024-9466 can potentially expose firewall usernames, passwords, and API keys.
CVE-2024-9466 affects users of Palo Alto Networks Expedition versions prior to 1.2.96.
No, an authenticated attacker is required to exploit CVE-2024-9466.