CVE-2024-9464
Palo Alto Expedition vulnerability analysis and mitigation

Overview

An OS command injection vulnerability (CVE-2024-9464) exists in Palo Alto Networks Expedition that allows an authenticated attacker to run arbitrary OS commands as root. The vulnerability affects Expedition versions prior to 1.2.96 and was discovered in July 2024. Expedition is a tool designed to help migrate configurations from supported vendors like Checkpoint and Cisco to Palo Alto Networks systems (Palo Advisory, Horizon3 Research).

Technical details

The vulnerability stems from improper input validation in the CronJobs.php file, where authenticated users can inject malicious commands through the start_time parameter. When the recurrence is set to 'Daily', the command is constructed using user-controlled variables without proper sanitization. The vulnerability has been assigned a CVSS v4.0 score of 9.3 (Critical) with the vector string CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:N/SA:N (Palo Advisory, Horizon3 Research).

Impact

Successful exploitation of this vulnerability can result in the disclosure of sensitive information including usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls. The attacker gains root-level access to the Expedition system, allowing complete control over the application and access to all stored credentials (NVD, Wiz Blog).

Mitigation and workarounds

Organizations should upgrade to Expedition version 1.2.96 or later, which addresses this vulnerability. Additional recommended mitigations include limiting network access to Expedition systems to authorized personnel only, rotating all Expedition-related credentials after upgrading, and disabling Expedition software if not actively in use. System logs should be monitored for suspicious activities targeting specific endpoints like /bin/CronJobs.php (Palo Advisory, Wiz Blog).

Additional resources


SourceThis report was generated using AI

Related Palo Alto Expedition vulnerabilities:

CVE ID

Severity

Score

Technologies

Component name

CISA KEV exploit

Has fix

Published date

CVE-2024-9463CRITICAL9.9
  • Palo Alto ExpeditionPalo Alto Expedition
  • cpe:2.3:a:paloaltonetworks:expedition_migration_tool
YesYesOct 09, 2024
CVE-2024-9464CRITICAL9.3
  • Palo Alto ExpeditionPalo Alto Expedition
  • cpe:2.3:a:paloaltonetworks:expedition_migration_tool
NoYesOct 09, 2024
CVE-2024-9465CRITICAL9.2
  • Palo Alto ExpeditionPalo Alto Expedition
  • cpe:2.3:a:paloaltonetworks:expedition_migration_tool
YesYesOct 09, 2024
CVE-2024-9466HIGH8.2
  • Palo Alto ExpeditionPalo Alto Expedition
  • cpe:2.3:a:paloaltonetworks:expedition_migration_tool
NoYesOct 09, 2024
CVE-2024-9467HIGH7
  • Palo Alto ExpeditionPalo Alto Expedition
  • cpe:2.3:a:paloaltonetworks:expedition_migration_tool
NoYesOct 09, 2024

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management