Vulnerability Description
An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paloaltonetworks | Expedition | >= 1.2.0, < 1.2.96 |
Related Weaknesses (CWE)
References
- https://security.paloaltonetworks.com/PAN-SA-2024-0010Vendor Advisory
- https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-
FAQ
What is CVE-2024-9464?
CVE-2024-9464 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleart...
How severe is CVE-2024-9464?
CVE-2024-9464 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2024-9464?
Check the references section above for vendor advisories and patch information. Affected products include: Paloaltonetworks Expedition.