Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-9464— Expedition: Authenticated OS Command Injection Vulnerability Leads to Firewall Admin Credential Disclosure

EPSS 85.31% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-9464

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Expedition: Authenticated OS Command Injection Vulnerability Leads to Firewall Admin Credential Disclosure
Source: NVD (National Vulnerability Database)
Vulnerability Description
An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
OS命令中使用的特殊元素转义处理不恰当(OS命令注入)
Source: NVD (National Vulnerability Database)
Vulnerability Title
Palo Alto Networks Expedition 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Palo Alto Networks Expedition是美国Palo Alto Networks公司的一种有助于配置迁移、调优和丰富的工具。 Palo Alto Networks Expedition存在安全漏洞。攻击者利用该漏洞以 root 身份运行任意操作系统命令。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
Palo Alto NetworksExpedition 1.2.0 ~ 1.2.96 cpe:2.3:a:paloaltonetworks:expedition:1.2.0:-:*:*:*:*:*:*

II. Public POCs for CVE-2024-9464

#POC DescriptionSource LinkShenlong Link
1Proof of Concept Exploit for CVE-2024-9464https://github.com/horizon3ai/CVE-2024-9464POC Details
2Nonehttps://github.com/nothe1senberg/CVE-2024-9464POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-9464

登录查看更多情报信息。

Same Patch Batch · Palo Alto Networks · 2024-10-09 · 10 CVEs total

CVE-2024-9463Expedition: Unauthenticated OS Command Injection Vulnerability Leads to Firewall Credentia
CVE-2024-9465Expedition: SQL Injection Leads to Firewall Admin Credential Disclosure
CVE-2024-9466Expedition: Cleartext Storage of Information Leads to Firewall Admin Credential Disclosure
CVE-2024-9467Expedition: Reflected Cross-Site Scripting Vulnerability Leads to Expedition Session Discl
CVE-2024-9468PAN-OS: Firewall Denial of Service (DoS) via a Maliciously Crafted Packet
CVE-2024-9469Cortex XDR Agent: Local Windows User Can Disable the Agent
CVE-2024-9470Cortex XSOAR: Information Disclosure Vulnerability
CVE-2024-9471PAN-OS: Privilege Escalation (PE) Vulnerability in XML API
CVE-2024-9473GlobalProtect App: Local Privilege Escalation (PE) Vulnerability

IV. Related Vulnerabilities

V. Comments for CVE-2024-9464

No comments yet


Leave a comment