Security Advisory 2024-108

Release Date:

Palo Alto Critical Vulnerabilities

Download

History:

  • 11/10/2024 --- v1.0 -- Initial publication

Summary

Palo Alto Networks has disclosed multiple critical vulnerabilities in its Expedition tool that can lead to unauthorised access to firewall credentials and sensitive data, including usernames, passwords, and API keys. The vulnerabilities allow attackers to execute arbitrary commands, read or write files, and exploit SQL injection flaws. Successful exploitation could result in a full takeover of affected systems.

Technical Details

The vulnerabilities include:

  • CVE-2024-9463: OS command injection allowing unauthenticated attackers to execute commands as root (CVSS 9.9).
  • CVE-2024-9464: Authenticated OS command injection (CVSS 9.3).
  • CVE-2024-9465: SQL injection leading to credential exposure and file access (CVSS 9.2).
  • CVE-2024-9466: Clear-text storage of sensitive information (CVSS 8.2).
  • CVE-2024-9467: Reflected XSS vulnerability enabling JavaScript execution (CVSS 7.0).

Affected Products

  • Expedition versions prior to 1.2.96.

Detection

In the /var/apache/log/access.log file, anomalous calls to the following endpoints might indicate abuse of these vulnerabilities:

  • /OS/startup/restore/restoreAdmin.php
  • /bin/CronJobs.php
  • /bin/configurations/parsers/Checkpoint/CHECKPOINT.php

Recommendations

It is recommended to upgrade to Expedition 1.2.96 or later to mitigate these vulnerabilities. The access and exposure to Expedition should also be limited.

References

[1] https://security.paloaltonetworks.com/PAN-SA-2024-0010

[2] https://www.securityweek.com/palo-alto-patches-critical-firewall-takeover-vulnerabilities

[3] https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/

We got cookies

We only use cookies that are necessary for the technical functioning of our website. Find out more on here.