cve,link,title,description,vendor,products,score,severity,epss,cisa,cisa_published,article,ransomware,exploited,exploited_date,poc,trended,trended_no_1,trended_no_1_date,published,trended_score CVE-2024-9474,https://securityvulnerability.io/vulnerability/CVE-2024-9474,Palo Alto Networks PAN-OS Privilege Escalation Vulnerability Affects Firewall,"A privilege escalation vulnerability exists in Palo Alto Networks PAN-OS software, allowing an administrator with access to the management web interface to execute actions on the firewall with heightened root privileges. This could potentially lead to unauthorized control and management of the firewall, exposing the organization to a range of security threats. It is important to note that cloud-based NGFW and Prisma Access solutions remain unaffected by this vulnerability.",Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",7.2,HIGH,0.9747999906539917,true,2024-11-18T00:00:00.000Z,true,false,true,2024-11-18T00:00:00.000Z,true,true,false,,2024-11-18T15:48:23.405Z,3897 CVE-2024-0012,https://securityvulnerability.io/vulnerability/CVE-2024-0012,Authentication Bypass Vulnerability Affects Palo Alto Networks PAN-OS Software,"An authentication bypass vulnerability exists in Palo Alto Networks PAN-OS software, allowing an attacker with network access to the management web interface to obtain administrator privileges without proper credentials. Exploiters can manipulate configuration settings and may take advantage of additional privilege escalation vulnerabilities. While the risk of unauthorized access can be mitigated by implementing access controls that restrict management web interface access to trusted internal IPs, adherence to recommended security practices is crucial to safeguarding the infrastructure. Notably, Cloud NGFW and Prisma Access are not affected by this vulnerability, which specifically impacts PAN-OS versions 10.2, 11.0, 11.1, and 11.2.",Palo Alto Networks,"Cloud Ngfw,Pan-os,Prisma Access",9.8,CRITICAL,0.969980001449585,true,2024-11-18T00:00:00.000Z,true,true,true,2024-11-18T00:00:00.000Z,true,true,true,2024-11-20T18:52:02.071Z,2024-11-18T15:47:41.407Z,24021 CVE-2024-3400,https://securityvulnerability.io/vulnerability/CVE-2024-3400,Palo Alto Networks PAN-OS Command Injection Vulnerability,"A vulnerability exists in the GlobalProtect feature of Palo Alto Networks PAN-OS software, allowing for arbitrary file creation. This issue can be exploited by an unauthenticated attacker to execute code with root privileges on the affected firewall systems. Specific configurations and versions are impacted, highlighting the need for careful management of firewall settings to mitigate risks. Cloud NGFW, Panorama appliances, and Prisma Access are not affected, reinforcing the importance of understanding the configurations and versions at risk.",Palo Alto Networks,"Pan-os,Cloud Ngfw,Prisma Access",10,CRITICAL,0.9639999866485596,true,2024-04-12T00:00:00.000Z,true,true,true,2024-03-26T22:12:23.000Z,true,true,true,2024-04-12T17:52:02.675Z,2024-04-12T07:20:00.707Z,173446 CVE-2024-5910,https://securityvulnerability.io/vulnerability/CVE-2024-5910,Expedition Admin Account Takeover Risk Due to Missing Authentication,"A critical vulnerability exists in Palo Alto Networks Expedition, where insufficient authentication mechanisms can be exploited, allowing unauthorized users to gain admin access. This flaw poses a serious risk, as attackers with network access can take control of Expedition admin accounts, potentially leading to exposure of sensitive configuration data, including secrets and credentials. Such a breach not only compromises the integrity of configuration management but also threatens the overall security posture of the affected systems.",Palo Alto Networks,Expedition,9.8,CRITICAL,0.9628900289535522,true,2024-11-07T00:00:00.000Z,true,false,true,2024-11-07T00:00:00.000Z,true,true,true,2024-11-11T02:52:02.156Z,2024-07-10T18:39:26.006Z,5555 CVE-2024-9463,https://securityvulnerability.io/vulnerability/CVE-2024-9463,Palo Alto Networks Expedition OS Command Injection Vulnerability,"The Palo Alto Networks Expedition tool has multiple critical vulnerabilities (CVE-2024-9463 to CVE-2024-9467) including OS command injection, SQL injection, cleartext storage of sensitive information, and cross-site scripting. These vulnerabilities can result in unauthorized access, credential theft, and administrative takeover. The vulnerabilities affect all versions of Expedition below 1.2.96, and urgent patching is recommended. The potential impact of exploitation includes disclosure of usernames, cleartext passwords, device configurations, and device API keys of PAN-OS firewalls, with the risk of sensitive data theft. There are no known exploits by ransomware groups at this time, but proactive measures such as upgrading to the latest version of Expedition, limiting network access, rotating credentials, and monitoring access logs are advised to minimize the risk of exploitation.",Palo Alto Networks,Expedition,7.5,HIGH,0.9618600010871887,true,2024-11-14T00:00:00.000Z,true,false,true,2024-10-10T10:07:05.000Z,,false,false,,2024-10-09T17:15:00.000Z,0 CVE-2024-9465,https://securityvulnerability.io/vulnerability/CVE-2024-9465,UnAuthenticated SQL Injection Vulnerability in Palo Alto Networks Expedition,"An SQL injection flaw in Palo Alto Networks Expedition presents a serious risk by allowing unauthenticated attackers to access and extract sensitive data from the Expedition database. This includes potential exposure of password hashes, usernames, device configurations, and API keys, all of which can be leveraged to enhance the attacker's capability. Additionally, the vulnerability enables unauthorized file creation and reading within the Expedition environment, raising significant concerns for data integrity and confidentiality.",Palo Alto Networks,Expedition,9.1,CRITICAL,0.9432200193405151,true,2024-11-14T00:00:00.000Z,true,false,true,2024-10-10T01:22:05.000Z,true,false,false,,2024-10-09T17:15:00.000Z,0