Loading HuntDB...

CVE-2025-0107

UNKNOWN
Published 2025-01-11T03:02:49.517Z
Actions:

Expert Analysis

Professional remediation guidance

Get tailored security recommendations from our analyst team for CVE-2025-0107. We'll provide specific mitigation strategies based on your environment and risk profile.

No CVSS data available

Description

An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.

Available Exploits

Palo Alto Networks Expedition - OS Command Injection

An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.

ID: CVE-2025-0107
Author: iamnoooobpdresearch Critical

Related News

CVE-2025-0107: PoC Exploit Code Released for Palo Alto Expedition RCE Flaw

Security researchers published the technical details and a proof-of-concept (PoC) exploit code for CVE-2025-0107, a vulnerability in Palo The post CVE-2025-0107: PoC Exploit Code Released for Palo Alto Expedition RCE Flaw appeared first on Cybersecurity News.

SecurityOnline.info 2025-01-18 01:43

Affected Products

GitHub Security Advisories

Community-driven vulnerability intelligence from GitHub

⚠ Unreviewed MODERATE

GHSA-mhj4-9938-5fpw

Advisory Details

An OS command injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.

CVSS Scoring

CVSS Score

5.0

CVSS Vector

CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:L/VA:L/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Green

Advisory provided by GitHub Security Advisory Database. Published: January 11, 2025, Modified: January 11, 2025

References

Published: 2025-01-11T03:02:49.517Z
Last Modified: 2025-01-24T04:56:01.054Z
Copied to clipboard!