← Volver a CVEs
CVE-2024-9465
CRITICALCISA KEV9.1
Descripcion
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
Detalles CVE
Puntuacion CVSS v3.19.1
SeveridadCRITICAL
Vector CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N
Vector de ataqueNETWORK
ComplejidadLOW
Privilegios requeridosNONE
Interaccion usuarioNONE
Publicado10/9/2024
Ultima modificacion11/4/2025
Fuentekev
Avistamientos honeypot0
CISA KEV
VendedorPalo Alto Networks
ProductoExpedition
Nombre vulnerabilidadPalo Alto Networks Expedition SQL Injection Vulnerability
Fecha inclusion KEV2024-11-14
Fecha limite remediacion2024-12-05
Uso en ransomwareUnknown
Productos afectados
paloaltonetworks:expedition
Debilidades (CWE)
CWE-89CWE-89
Referencias
https://security.paloaltonetworks.com/PAN-SA-2024-0010(psirt@paloaltonetworks.com)
https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/(psirt@paloaltonetworks.com)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-9465(134c704f-9b21-4f2e-91b3-4a467353bcc0)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.