Entreprise d'experts en Sécurité Informatique : Audits et conseils en cybersécurité
Entreprise française de cybersécurité depuis 2004
☎ 03 60 47 09 81 - info@securiteinfo.com


CVE-2024-9464

Description

An OS command injection vulnerability in Palo Alto Networks Expedition allows an authenticated attacker to run arbitrary OS commands as root in Expedition, resulting in disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls.

POC

Reference

- https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise/

Github

- https://github.com/12442RF/POC

- https://github.com/DMW11525708/wiki

- https://github.com/Lern0n/Lernon-POC

- https://github.com/Linxloop/fork_POC

- https://github.com/adysec/POC

- https://github.com/eeeeeeeeee-code/POC

- https://github.com/fkie-cad/nvd-json-data-feeds

- https://github.com/greenberglinken/2023hvv_1

- https://github.com/horizon3ai/CVE-2024-9464

- https://github.com/iemotion/POC

- https://github.com/laoa1573/wy876

- https://github.com/nomi-sec/PoC-in-GitHub

- https://github.com/nothe1senberg/CVE-2024-9464

- https://github.com/oLy0/Vulnerability

- https://github.com/p33d/Palo-Alto-Expedition-Remote-Code

- https://github.com/plbplbp/loudong001

- https://github.com/tequilasunsh1ne/paloalto_auth_rce

- https://github.com/wy876/POC

- https://github.com/wy876/wiki