CVE-2024-9465
Expedition: SQL Injection Leads to Firewall Admin Credential Disclosure
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- October 03, 2024
- Published Date
- October 09, 2024
- Last Updated
- November 14, 2024
- Vendor
- Palo Alto Networks
- Product
- Expedition
- Description
- An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.
CVSS Scores
CVSS v4.0
9.2 - CRITICAL
Vector: CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:H/SI:N/SA:N/AU:N/R:U/V:C/RE:H/U:Amber
SSVC Information
- Exploitation
- active
- Automatable
- Yes
- Technical Impact
- total
References
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-11-14 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nuclei | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2024/CVE-2024-9465.yaml | 2025-04-26 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
horizon3ai/CVE-2024-9465
Type: github • Created: 2024-10-09 16:22:05 UTC • Stars: 29
Proof of Concept Exploit for CVE-2024-9465