An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
References
Link | Resource |
---|---|
https://security.paloaltonetworks.com/PAN-SA-2024-0010 | Mitigation Vendor Advisory |
Configurations
History
15 Oct 2024, 15:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:* | |
References | () https://security.paloaltonetworks.com/PAN-SA-2024-0010 - Mitigation, Vendor Advisory | |
First Time |
Paloaltonetworks expedition
Paloaltonetworks |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 17:15
Updated : 2024-11-15 02:00
NVD link : CVE-2024-9463
Mitre link : CVE-2024-9463
CVE.ORG link : CVE-2024-9463
JSON object : View
Products Affected
paloaltonetworks
- expedition
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')