CVE-2024-9463

HIGH KEV NUCLEI

Paloaltonetworks Expedition < 1.2.96 - OS Command Injection

Title source: rule

Description

An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.

Exploits (1)

nomisec WORKING POC 1 stars
by momo1239 · remote
https://github.com/momo1239/CVE-2024-9463-Proof-of-Concept

Nuclei Templates (1)

PaloAlto Networks Expedition - Remote Code Execution
CRITICALVERIFIEDby princechaddha
Shodan: http.favicon.hash:1499876150

Scores

CVSS v3 7.5
EPSS 0.9420
EPSS Percentile 99.9%
Attack Vector NETWORK
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Details

CISA KEV 2024-11-14
VulnCheck KEV 2024-10-15
InTheWild.io 2024-11-14
ENISA EUVD EUVD-2024-49955
CWE
CWE-78
Status published
Products (1)
paloaltonetworks/expedition 1.2.0 - 1.2.96
Published Oct 09, 2024
KEV Added Nov 14, 2024
Tracked Since Feb 18, 2026