7.7
CVE-2025-0107
- EPSS 35.13%
- Veröffentlicht 11.01.2025 03:15:22
- Zuletzt bearbeitet 15.01.2025 23:15:10
- Quelle psirt@paloaltonetworks.com
- CVE-Watchlists
- Unerledigt
An OS command injection vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.
Verknüpft mit AI von unstrukturierten Daten zu bestehenden CPE der NVD
Daten sind bereitgestellt durch das CVE Programm von einer CVE Numbering Authority (CNA) (Unstrukturiert).
HerstellerPalo Alto Networks
≫
Produkt
Cloud NGFW
Default Statusunaffected
Version
All
Status
unaffected
HerstellerPalo Alto Networks
≫
Produkt
Expedition
Default Statusunaffected
Version <
1.2.100
Version
1
Status
affected
HerstellerPalo Alto Networks
≫
Produkt
Panorama
Default Statusunaffected
Version
All
Status
unaffected
HerstellerPalo Alto Networks
≫
Produkt
PAN-OS
Default Statusunaffected
Version
All
Status
unaffected
HerstellerPalo Alto Networks
≫
Produkt
Prisma Access
Default Statusunaffected
Version
All
Status
unaffected
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 35.13% | 0.969 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| psirt@paloaltonetworks.com | 7.7 | 0 | 0 |
CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:L/VI:L/VA:L/SC:H/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:C/RE:H/U:Green
|
CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
The product constructs all or part of an OS command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended OS command when it is sent to a downstream component.