CVE-2024-9466
Expedition: Cleartext Storage of Information Leads to Firewall Admin Credential Disclosure
Severity Score
8.2
*CVSS v4
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
2
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
Track*
*SSVC
Descriptions
A cleartext storage of sensitive information vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to reveal firewall usernames, passwords, and API keys generated using those credentials.
*Credits:
Zach Hanley (@hacks_zach) of Horizon3.ai
CVSS Scores
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Attack Requirements
Privileges Required
User Interaction
System
Vulnerable | Subsequent
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Privileges Required
User Interaction
Scope
Confidentiality
Integrity
Availability
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:Track*
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2024-10-03 CVE Reserved
- 2024-10-09 CVE Published
- 2024-10-18 CVE Updated
- 2024-10-18 First Exploit
- 2025-08-05 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-532: Insertion of Sensitive Information into Log File
CAPEC
- CAPEC-37: Retrieve Embedded Sensitive Data
References (3)
URL | Tag | Source |
---|
URL | Date | SRC |
---|---|---|
https://github.com/holypryx/CVE-2024-9466 | 2024-10-19 | |
https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise | 2024-10-18 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://security.paloaltonetworks.com/PAN-SA-2024-0010 | 2024-10-09 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Palo Alto Networks Search vendor "Palo Alto Networks" | Expedition Search vendor "Palo Alto Networks" for product "Expedition" | >= 1.2.0 < 1.2.96 Search vendor "Palo Alto Networks" for product "Expedition" and version " >= 1.2.0 < 1.2.96" | en |
Affected
|