An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
References
Configurations
History
17 Oct 2024, 06:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
15 Oct 2024, 15:06
Type | Values Removed | Values Added |
---|---|---|
References | () https://security.paloaltonetworks.com/PAN-SA-2024-0010 - Vendor Advisory | |
CPE | cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:* | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
First Time |
Paloaltonetworks expedition
Paloaltonetworks |
10 Oct 2024, 12:51
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
09 Oct 2024, 17:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-10-09 17:15
Updated : 2024-10-17 06:15
NVD link : CVE-2024-9464
Mitre link : CVE-2024-9464
CVE.ORG link : CVE-2024-9464
JSON object : View
Products Affected
paloaltonetworks
- expedition
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')