Vulnerability Description
The Palo Alto Networks Expedition Migration tool 1.0.107 and earlier may allow an unauthenticated attacker with remote access to run system level commands on the device hosting this service/application.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paloaltonetworks | Expedition | 1.0.107 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/106174Third Party AdvisoryVDB Entry
- https://doddsecurity.com/234/command-injection-on-palo-alto-networks-expedition/ExploitThird Party Advisory
- https://security.paloaltonetworks.com/CVE-2018-10143
- http://www.securityfocus.com/bid/106174Third Party AdvisoryVDB Entry
- https://doddsecurity.com/234/command-injection-on-palo-alto-networks-expedition/ExploitThird Party Advisory
- https://security.paloaltonetworks.com/CVE-2018-10143
FAQ
What is CVE-2018-10143?
CVE-2018-10143 is a vulnerability with a CVSS score of 9.8 (CRITICAL). The Palo Alto Networks Expedition Migration tool 1.0.107 and earlier may allow an unauthenticated attacker with remote access to run system level commands on the device hosting this service/applicatio...
How severe is CVE-2018-10143?
CVE-2018-10143 has been rated CRITICAL with a CVSS base score of 9.8/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-10143?
Check the references section above for vendor advisories and patch information. Affected products include: Paloaltonetworks Expedition.