Friday , January 10 2025
Expedition

Palo Alto Networks Expedition Tool Vuln Lead to Exposure of Firewall Credentials

Palo Alto Networks released a security advisory about vulnerabilities in its Expedition migration tool that could expose sensitive data and enable unauthorized actions on affected systems.

Expedition, formerly the Migration Tool, is a free tool that helps users migrate to the Palo Alto Networks NGFW platform and provides a temporary workspace to optimize security policies.

Top 4 Malware you have to Prepare for in 2025

In 2025, malware attacks will persist. To prepare, organizations should familiarize themselves with common malware families. Here are five to...
Read More
Top 4 Malware you have to Prepare for in 2025

Palo Alto Networks Expedition Tool Vuln Lead to Exposure of Firewall Credentials

Palo Alto Networks released a security advisory about vulnerabilities in its Expedition migration tool that could expose sensitive data and...
Read More
Palo Alto Networks Expedition Tool Vuln Lead to Exposure of Firewall Credentials

US introduces Cyber Trust Mark for smart devices

Launched in July 2023, the new US Cyber Trust Mark allows smart devices from participating vendors to showcase their cyber...
Read More
US introduces Cyber Trust Mark for smart devices

CISA warns of critical Oracle, Mitel flaws active exploitation

CISA has urgent warnings for organizations regarding three security flaws in Mitel and Oracle systems that are currently being exploited....
Read More
CISA warns of critical Oracle, Mitel flaws active exploitation

Best Cybersecurity Certifications for Your Career in 2025

Cybersecurity professionals serve as the first line of defense against hackers, hacktivists, and ransomware groups. To combat these cyber threats,...
Read More
Best Cybersecurity Certifications for Your Career in 2025

CVE-2024-40766
48,000+ Vulnerable SonicWall Devices exposed to ransomware attack

Over 48,000 SonicWall devices are still vulnerable to a serious security flaw, putting organizations worldwide at risk of ransomware attacks....
Read More
CVE-2024-40766  48,000+ Vulnerable SonicWall Devices exposed to ransomware attack

India releases draft Digital Personal Data Protection Rules

On Friday, the Indian government released the draft Digital Personal Data Protection Rules, requiring social media and online platforms to...
Read More
India releases draft Digital Personal Data Protection Rules

Microsoft to invest $80 Billion in AI Data Center

Microsoft recently shared a vision for the future of American technology and economic competitiveness, highlighting Artificial Intelligence (AI) as central...
Read More
Microsoft to invest $80 Billion in AI Data Center

City Bank Customer financial reports posted dark market for sale

According to Bangladesh Cyber ​​Security Intelligence (BCSI) report, City Bank has been the victim of a cyber attack. The hacker...
Read More
City Bank Customer financial reports posted dark market for sale

3.3 Million Email Server Expose User Passwords and Messages in Plain Text

Around 3.3 million servers are running POP3/IMAP email services without encryption (TLS) enabled, the Shadowserver Foundation, a nonprofit security organization,...
Read More
3.3 Million Email Server Expose User Passwords and Messages in Plain Text

These vulnerabilities pose serious risks for organizations using the tool for firewall migration and optimization. It is meant for temporary use only during migrations and not for production environments. The tool will reach its End of Life (EoL) on December 31, 2024.

Details Of The Vulnerabilities:

CVE-2025-0103 (CVSS 7.8): An SQL injection vulnerability lets authenticated attackers access Expedition’s database, exposing sensitive information such as password hashes and device configurations. It also allows them to create or read arbitrary files on the system.

CVE-2025-0104 (CVSS 4.7): A vulnerability that allows attackers to run harmful scripts in a user’s browser, which can lead to stealing information or hijacking sessions.

CVE-2025-0105 (CVSS 2.7): Allows unauthorized users to delete files accessible to the Expedition system’s “www-data” user.

CVE-2025-0106 (CVSS 2.7): A vulnerability allows attackers to list files on the system without needing to log in.

CVE-2025-0107 (CVSS 2.3): This vulnerability allows logged-in attackers to run any OS commands as the “www-data” user, potentially exposing sensitive firewall credentials.

These vulnerabilities don’t directly impact Palo Alto Networks firewalls, Panorama, Prisma Access, or Cloud NGFWs, but they severely weaken the security of systems using vulnerable Expedition versions.

Palo Alto Networks has released patches in Expedition version 1.2.101 and later. Organizations should upgrade immediately and change all credentials used with the tool.

Limiting network access to authorized users and disabling unused Expedition instances are essential to reduce risks.

Although there is currently no evidence of active exploitation, the existence of proof-of-concept exploits for similar vulnerabilities heightens concerns about possible future attacks. Organizations using Expedition must act quickly to protect their systems from unauthorized access.

Since Expedition has reached its end of life, users should switch to alternative tools recommended by Palo Alto Networks for firewall migration and policy optimization.

The discovery highlights the need to secure temporary tools like Expedition that manage sensitive data during important tasks, such as firewall migrations.

Check Also

PAN-OS

Update Immediately
Palo Alto Releases Patch for PAN-OS DoS Flaw

Palo Alto Networks has revealed a high severity vulnerability in PAN-OS software that may lead …

Leave a Reply

Your email address will not be published. Required fields are marked *