CVE-2024-9465
Palo Alto Networks Expedition SQL Injection Vulnerability
Severity Score
9.2
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
3
*Multiple Sources
Exploited in Wild
Yes
*KEV
Decision
Act
*SSVC
Descriptions
An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
Palo Alto Networks Expedition contains a SQL injection vulnerability that allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
*Credits:
Zach Hanley (@hacks_zach) of Horizon3.ai, Enrique Castillo of Palo Alto Networks
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Act
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-10-03 CVE Reserved
- 2024-10-09 CVE Published
- 2024-10-09 First Exploit
- 2024-11-14 CVE Updated
- 2024-11-14 Exploited in Wild
- 2024-11-16 EPSS Updated
- 2024-12-05 KEV Due Date
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
- CAPEC-108: Command Line Execution through SQL Injection
References (4)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/horizon3ai/CVE-2024-9465 | 2024-10-09 | |
https://github.com/mustafaakalin/CVE-2024-9465 | 2024-10-10 | |
https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise | 2024-11-14 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.paloaltonetworks.com/PAN-SA-2024-0010 | 2024-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Palo Alto Networks Search vendor "Palo Alto Networks" | Expedition Search vendor "Palo Alto Networks" for product "Expedition" | >= 1.2.0 < 1.2.96 Search vendor "Palo Alto Networks" for product "Expedition" and version " >= 1.2.0 < 1.2.96" | en |
Affected
|