CVE-2024-9463
HIGH KEV NUCLEIPaloaltonetworks Expedition < 1.2.96 - OS Command Injection
Title source: ruleDescription
An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
Exploits (1)
nomisec
WORKING POC
1 stars
by momo1239 · remote
https://github.com/momo1239/CVE-2024-9463-Proof-of-Concept
Nuclei Templates (1)
PaloAlto Networks Expedition - Remote Code Execution
CRITICALVERIFIEDby princechaddha
Shodan:
http.favicon.hash:1499876150
Scores
CVSS v3
7.5
EPSS
0.9420
EPSS Percentile
99.9%
Attack Vector
NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Details
CISA KEV
2024-11-14
VulnCheck KEV
2024-10-15
InTheWild.io
2024-11-14
ENISA EUVD
EUVD-2024-49955
CWE
CWE-78
Status
published
Products (1)
paloaltonetworks/expedition
1.2.0 - 1.2.96
Published
Oct 09, 2024
KEV Added
Nov 14, 2024
Tracked Since
Feb 18, 2026