Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2024-9464 — OS Command Injection in Palo Alto Networks Expedition
Severity
9.3CRITICALNVD
EPSS
85.3%
top 0.63%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 9
Latest updateNov 14
Description
An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
CVSS vector
CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N
Affected Packages2 packages
🔴Vulnerability Details
2CVEList▶
Expedition: Authenticated OS Command Injection Vulnerability Leads to Firewall Admin Credential Disclosure↗2024-10-09
GHSA▶
GHSA-r7wf-fpff-w68q: An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedi↗2024-10-09
💥Exploits & PoCs
1🔍Detection Rules
1Suricata▶
ET WEB_SPECIFIC_APPS Palo Alto Expedition Authenticated Command Injection via Cronjobs (CVE-2024-9464)↗2024-10-10