Wednesday , February 19 2025
Expedition

Palo Alto Networks Expedition Tool Vuln Lead to Exposure of Firewall Credentials

Palo Alto Networks released a security advisory about vulnerabilities in its Expedition migration tool that could expose sensitive data and enable unauthorized actions on affected systems.

Expedition, formerly the Migration Tool, is a free tool that helps users migrate to the Palo Alto Networks NGFW platform and provides a temporary workspace to optimize security policies.

150 Gov.t Portal affected
Black-Hat SEO Poisoning Indian “.gov.in, .ac.in” domain

Indian government and educational websites, along with reputable financial brands, have experienced SEO poisoning, causing user traffic to be redirected...
Read More
150 Gov.t Portal affected  Black-Hat SEO Poisoning Indian “.gov.in, .ac.in” domain

CVE-2018-19410 Exposes 600 PRTG Instances in Bangladesh

The Cyber Threat Intelligence Unit of BGD e-GOV CIRT has found 600 vulnerable PRTG instances in Bangladesh, affected by the...
Read More
CVE-2018-19410 Exposes 600 PRTG Instances in Bangladesh

Builder claims Rs 150 cr for data loss; AWS faces FIR In Bengaluru

Amazon Web Services (AWS) has been named in an FIR after a builder claimed damages to the tune of Rs...
Read More
Builder claims Rs 150 cr for data loss;  AWS faces FIR In Bengaluru

CISA Warns Active Exploitation of Apple iOS Security Flaw

CISA has issued an urgent warning about a critical zero-day vulnerability in Apple iOS and iPadOS, known as CVE-2025-24200, which...
Read More
CISA Warns Active Exploitation of Apple iOS Security Flaw

Massive IoT Data Breach Exposes 2.7 Billion Records

A major IoT data breach has exposed 2.7 billion records, including Wi-Fi network names, passwords, IP addresses, and device IDs....
Read More
Massive IoT Data Breach Exposes 2.7 Billion Records

SonicWall Firewall Auth Bypass Vulnerability Exploited in Wild

A serious authentication bypass vulnerability in SonicWall firewalls, called CVE-2024-53704, is currently being exploited, according to cybersecurity firms. The increase...
Read More
SonicWall Firewall Auth Bypass Vulnerability Exploited in Wild

AMD Patches High-Severity SMM Vulns Affecting EPYC and Ryzen Processors

AMD has released security patches for two high-severity vulnerabilities in its System Management Mode (SMM). If exploited, these could let...
Read More
AMD Patches High-Severity SMM Vulns Affecting EPYC and Ryzen Processors

Lazarus Group Unleashes New Malware Against Developers Worldwide

Lazarus Group has initiated a complex global campaign aimed at software developers and cryptocurrency users. Operation Marstech Mayhem uses the...
Read More
Lazarus Group Unleashes New Malware Against Developers Worldwide

Daily Security Update Dated : 15.02.2025

Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
Daily Security Update Dated : 15.02.2025

Salt Typhoon to target Bangladeshi Universities, One identified

RedMike (Salt Typhoon) targeted university devices in Bangladesh, likely to access research in telecommunications, engineering, and technology, especially from institutions...
Read More
Salt Typhoon to target Bangladeshi Universities, One identified

These vulnerabilities pose serious risks for organizations using the tool for firewall migration and optimization. It is meant for temporary use only during migrations and not for production environments. The tool will reach its End of Life (EoL) on December 31, 2024.

Details Of The Vulnerabilities:

CVE-2025-0103 (CVSS 7.8): An SQL injection vulnerability lets authenticated attackers access Expedition’s database, exposing sensitive information such as password hashes and device configurations. It also allows them to create or read arbitrary files on the system.

CVE-2025-0104 (CVSS 4.7): A vulnerability that allows attackers to run harmful scripts in a user’s browser, which can lead to stealing information or hijacking sessions.

CVE-2025-0105 (CVSS 2.7): Allows unauthorized users to delete files accessible to the Expedition system’s “www-data” user.

CVE-2025-0106 (CVSS 2.7): A vulnerability allows attackers to list files on the system without needing to log in.

CVE-2025-0107 (CVSS 2.3): This vulnerability allows logged-in attackers to run any OS commands as the “www-data” user, potentially exposing sensitive firewall credentials.

These vulnerabilities don’t directly impact Palo Alto Networks firewalls, Panorama, Prisma Access, or Cloud NGFWs, but they severely weaken the security of systems using vulnerable Expedition versions.

Palo Alto Networks has released patches in Expedition version 1.2.101 and later. Organizations should upgrade immediately and change all credentials used with the tool.

Limiting network access to authorized users and disabling unused Expedition instances are essential to reduce risks.

Although there is currently no evidence of active exploitation, the existence of proof-of-concept exploits for similar vulnerabilities heightens concerns about possible future attacks. Organizations using Expedition must act quickly to protect their systems from unauthorized access.

Since Expedition has reached its end of life, users should switch to alternative tools recommended by Palo Alto Networks for firewall migration and policy optimization.

The discovery highlights the need to secure temporary tools like Expedition that manage sensitive data during important tasks, such as firewall migrations.

Check Also

Insikt Group

Salt Typhoon Exploits Vulnerable Cisco Devices of Telcoms Globally

Between December 2024 and January 2025, Recorded Future’s Insikt Group discovered a campaign targeting unpatched …

Leave a Reply

Your email address will not be published. Required fields are marked *