An OS command injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.
References
| Link | Resource |
|---|---|
| https://security.paloaltonetworks.com/PAN-SA-2024-0010 | Mitigation Vendor Advisory |
| https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-9463 | US Government Resource |
Configurations
History
04 Nov 2025, 16:48
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-9463 - US Government Resource |
21 Oct 2025, 23:16
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 20:20
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
21 Oct 2025, 19:21
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
15 Oct 2024, 15:05
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
| First Time |
Paloaltonetworks
Paloaltonetworks expedition |
|
| References | () https://security.paloaltonetworks.com/PAN-SA-2024-0010 - Mitigation, Vendor Advisory | |
| CPE | cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:* |
10 Oct 2024, 12:51
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
09 Oct 2024, 17:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-10-09 17:15
Updated : 2025-11-04 16:48
NVD link : CVE-2024-9463
Mitre link : CVE-2024-9463
CVE.ORG link : CVE-2024-9463
JSON object : View
Products Affected
paloaltonetworks
- expedition
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
