Palo Alto Networks Expedition Command Injection (CVE-2024-9463)

high Nessus Plugin ID 209281

Synopsis

A firewall solution installed on the remote host is affected by a command injection vulnerability.

Description

The Palo Alto Networks Expedition installed on the remote host is affected by a command injection vulnerability:

- An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. (CVE-2024-9463)

Solution

Upgrade to Palo Alto Networks Expedition 1.2.96 or later.

See Also

http://www.nessus.org/u?033434d5

Plugin Details

Severity: High

ID: 209281

File Name: palo_alto_expedition_CVE-2024-9463.nbin

Version: 1.1

Type: remote

Family: CGI abuses

Published: 10/18/2024

Updated: 10/18/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.1

CVSS v2

Risk Factor: High

Base Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:N/A:N

CVSS Score Source: CVE-2024-9463

CVSS v3

Risk Factor: High

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Vulnerability Information

CPE: cpe:/a:paloaltonetworks:expedition_migration_tool

Required KB Items: installed_sw/Palo Alto Expedition

Exploited by Nessus: true

Patch Publication Date: 10/2/2024

Vulnerability Publication Date: 10/9/2024

Reference Information

CVE: CVE-2024-9463