← Zuruck zu CVEs
CVE-2024-9463
HIGHCISA KEV7.5
Beschreibung
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
CVE Details
CVSS v3.1 Bewertung7.5
SchweregradHIGH
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht10/9/2024
Zuletzt geandert11/4/2025
Quellekev
Honeypot-Sichtungen0
CISA KEV
HerstellerPalo Alto Networks
ProduktExpedition
SchwachstellennamePalo Alto Networks Expedition OS Command Injection Vulnerability
KEV Aufnahmedatum2024-11-14
Behebungsfrist2024-12-05
Ransomware-NutzungUnknown
Betroffene Produkte
paloaltonetworks:expedition
Schwachen (CWE)
CWE-78CWE-78
Referenzen
https://security.paloaltonetworks.com/PAN-SA-2024-0010(psirt@paloaltonetworks.com)
https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-9463(134c704f-9b21-4f2e-91b3-4a467353bcc0)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.