CVE-2024-5910
Palo Alto Expedition vulnerability analysis and mitigation

Overview

CVE-2024-5910 is a critical vulnerability (CVSS score: 9.3) discovered in Palo Alto Networks Expedition, a tool designed for configuration migration and tuning. The vulnerability, identified by Brian Hysell from Synopsys CyRC, involves missing authentication for a critical function that can lead to admin account takeover. The issue affects Expedition versions prior to 1.2.92 and was initially disclosed on July 10, 2024 (Palo Advisory, Hacker News).

Technical details

The vulnerability stems from an unauthenticated access to a critical PHP file located in /var/www/html/ directory that allows resetting the admin password. The flaw is characterized by CWE-306 (Missing Authentication for Critical Function) and received a CVSS v4.0 base score of 9.3 CRITICAL. The attack vector is network-based with low attack complexity, requiring no privileges or user interaction (Palo Advisory, Horizon3).

Impact

The vulnerability allows attackers with network access to Expedition to take over admin accounts and potentially access sensitive data. Since Expedition is used for configuration migration, all configuration secrets, credentials, and other data imported into the system are at risk. The impact affects confidentiality, integrity, and availability at high levels (Palo Advisory).

Mitigation and workarounds

The vulnerability has been patched in Expedition version 1.2.92 and later versions. As a workaround, organizations are advised to restrict network access to Expedition to only authorized users, hosts, or networks. It's recommended to ensure the application is not exposed to the internet unless absolutely necessary (Palo Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

“Best User Experience I have ever seen, provides full visibility to cloud workloads.”
David EstlickCISO
“Wiz provides a single pane of glass to see what is going on in our cloud environments.”
Adam FletcherChief Security Officer
“We know that if Wiz identifies something as critical, it actually is.”
Greg PoniatowskiHead of Threat and Vulnerability Management