Vulnerability Description
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Paloaltonetworks | Expedition | >= 1.2.0, < 1.2.96 |
Related Weaknesses (CWE)
References
- https://security.paloaltonetworks.com/PAN-SA-2024-0010MitigationVendor Advisory
- https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-Exploit
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-US Government Resource
FAQ
What is CVE-2024-9465?
CVE-2024-9465 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, an...
How severe is CVE-2024-9465?
CVE-2024-9465 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2024-9465?
Check the references section above for vendor advisories and patch information. Affected products include: Paloaltonetworks Expedition.