Exploit
CVE-2024-5910

Missing Authentication for Critical Function (CWE-306)

Published: Jul 10, 2024 / Updated: 4mo ago

010
CVSS 9.3EPSS 0.04%Critical
CVE info copied to clipboard

Summary

Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition. Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue.

Impact

The impact of this vulnerability is severe. Attackers with network access to Expedition can potentially take over an Expedition admin account. This compromises the security of the entire Expedition system, putting at risk all configuration secrets, credentials, and other sensitive data that has been imported into Expedition. The vulnerability could lead to unauthorized access, data breaches, and potential misuse of the compromised admin account to further infiltrate the network or manipulate configurations. The CVSS v4 base score for this vulnerability is 9.3 (Critical), indicating a high severity level. The attack vector is network-based, with low attack complexity and no user interaction required, making it potentially easy for attackers to exploit.

Exploitation

There is no evidence that a public proof-of-concept exists. The vulnerability is actively being exploited in the wild and was added to the CISA Known Exploited Vulnerability list. Its exploitation has been reported by various sources, including cisa.gov, bleepingcomputer.com.

Patch

As of the current information provided, there is no mention of an available patch. The security team should closely monitor Palo Alto Networks' security advisories for any forthcoming patches or updates to address this vulnerability.

Mitigation

Given the severity of this vulnerability, immediate mitigation steps are crucial: 1. Restrict network access to Expedition as much as possible, implementing strict access controls and network segmentation. 2. Monitor Expedition admin account activities closely for any suspicious behavior. 3. If feasible, consider temporarily disabling Expedition until a patch is available, especially if the risk is deemed too high for your environment. 4. Regularly review and audit all data imported into Expedition, minimizing the amount of sensitive information stored when possible. 5. Implement additional layers of authentication for accessing Expedition, such as multi-factor authentication, if not already in place. 6. Keep all Palo Alto Networks products, especially Expedition, updated to the latest available versions. 7. Continuously monitor Palo Alto Networks' security advisories for updates on this vulnerability and any recommended actions.

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:M/U:Red

Timeline

First Article

Feedly found the first article mentioning CVE-2024-5910. See article

Jul 10, 2024 at 4:53 PM / #cve
CVSS Estimate

Feedly estimated the CVSS score as HIGH

Jul 10, 2024 at 4:55 PM
CVE Assignment

NVD published the first details for CVE-2024-5910

Jul 10, 2024 at 7:15 PM
Trending

This CVE started to trend in security discussions

Jul 10, 2024 at 10:06 PM
EPSS

EPSS Score was set to: 0.04% (Percentile: 9.3%)

Jul 11, 2024 at 11:39 AM
Trending

This CVE stopped trending in security discussions

Jul 14, 2024 at 9:08 PM
Detection in Vulnerability Scanners

Detection for the vulnerability has been added to Qualys (380183)

Jul 15, 2024 at 7:53 AM
Trending

This CVE started to trend in security discussions

Jul 16, 2024 at 10:38 AM
Trending

This CVE stopped trending in security discussions

Jul 16, 2024 at 11:25 PM
Static CVE Timeline Graph

Affected Systems

Paloaltonetworks/expedition
+null more

Proof Of Exploit

https://www.cisa.gov/known-exploited-vulnerabilities-catalog
+null more

Patches

security.paloaltonetworks.com
+null more

Attack Patterns

CAPEC-12: Choosing Message Identifier
+null more

References

Potential RCE Vulnerability in PAN-OS Management Interface Prompts Urgent Security Measures
Palo Alto Networks has issued an advisory warning of a potential remote code execution (RCE) vulnerability in its PAN-OS management interface. Impact: The potential RCE vulnerability in the PAN-OS management interface raises significant concerns for organizations that rely on Palo Alto Networks’ firewall solutions.
Cybersecurity Threat Advisory: New critical vulnerability in Palo Alto Expedition
As the vulnerabilities allow bad actors to bypass authentication and take over administrative accounts, they pose a substantial risk to organizations using Palo Alto Expedition and firewalls. In addition to CVE-2024-5910, several other vulnerabilities have been identified in Palo Alto Networks firewalls that allow for remote code execution.
Palo Alto Expedition 多个漏洞(CVE-2024-5910 & CVE-2024-9464 & CVE-2024-9465)
On July 10, 2024, Palo Alto released a security advisory for [CVE-2024-5910](https://security.paloaltonetworks.com/CVE-2024-5910), a vulnerability which allowed attackers to remotely reset the Expedition application admin credentials. We happen upon the file `/var/www/html/bin/CronJobs.php`, because it contains both a call to ‘exec’ and takes user input from the passed request parameters.
See 9 more references

News

Weekly Security Sprint EP 90. CISA future, more liability, and password problems
Canadian Centre for Cyber Security – Alert – Securing Palo Alto management interfaces from exploitation . CVE-2024-9463 Palo Alto Networks Expedition OS Command Injection Vulnerability
zetraxz/CVE-2024-5910
[GitHub]CVE-2024-5910: Missing Authentication for Critical Function (CWE-306)
CISA Issues Alert on Ongoing Exploitation of Palo Alto Networks Bugs
A spokesperson for Palo Alto Networks (PAN) confirmed patches were available to address these security vulnerabilities, and stated the company is "monitoring a limited set of exploit activities" and is working with external researchers, business partners, and customers to share information in a timely fashion. A report released by the Cybersecurity and Infrastructure Security Agency, a nonprofit organization that monitors and analyzes threats to the nation's infrastructure, found that Palo Alto Networks' firewall management software was actively exploited in the wild on Thursday.
Metasploit Weekly Wrap-Up: 11/15/2024
Description: Adds a module to chain CVE-2024-5910, a password reset vulnerability with CVE-2024-9464, an authenticated command-injection vulnerability to gain code execution on PaloAlto Expedition servers between versions after 1.2 and before 1.2.92 with or without knowledge of the credentials. The module makes use of both vulnerabilities in order to obtain unauthenticated RCE in the context of the user www-data.
Palo Alto Networks patches two firewall zero-days used in attacks
"Palo Alto Networks has actively monitored and worked with customers to identify and further minimize the very small number of PAN-OS devices with management web interfaces exposed to the Internet or other untrusted networks, " it added in a separate report providing indicators of compromise for ongoing attacks targeting the flaws. "Palo Alto Networks observed threat activity that exploits this vulnerability against a limited number of management web interfaces that are exposed to internet traffic coming from outside the network," the company warned today regarding both zero-days.
See 277 more articles and social media posts

CVSS V3.1

Attack Vector:Network
Attack Complexity:Low
Privileges Required:None
User Interaction:None
Scope:Unchanged
Confidentiality:High
Integrity:High
Availability Impact:High

Categories

Be the first to know about critical vulnerabilities

Collect, analyze, and share vulnerability reports faster using AI