Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-9465: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Palo Alto Networks Expedition

0
Critical
VulnerabilityCVE-2024-9465cvecve-2024-9465cwe-89
Published: Wed Oct 09 2024 (10/09/2024, 17:04:01 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: Expedition

Description

An SQL injection vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system.

AI-Powered Analysis

Machine-generated threat intelligence

AILast updated: 02/27/2026, 17:05:16 UTC

Technical Analysis

CVE-2024-9465 is an SQL injection vulnerability classified under CWE-89 affecting Palo Alto Networks Expedition version 1.2.0. The flaw arises from improper neutralization of special elements in SQL commands, allowing unauthenticated attackers to inject malicious SQL queries. This enables attackers to exfiltrate sensitive data stored in the Expedition database, including password hashes, usernames, device configurations, and API keys. Furthermore, the vulnerability permits attackers to create and read arbitrary files on the system hosting Expedition, potentially leading to further compromise or persistence. The vulnerability is remotely exploitable over the network without any authentication or user interaction, increasing its risk profile. The CVSS 4.0 vector indicates network attack vector (AV:N), low attack complexity (AC:L), no privileges required (PR:N), no user interaction (UI:N), and high impact on confidentiality (C:H), with moderate impact on integrity (I:L) and no impact on availability (A:N). The scope is high, meaning the vulnerability affects components beyond the initially vulnerable component. Although no public exploits have been reported yet, the criticality of the vulnerability and the sensitive nature of the data at risk make it a significant threat to organizations using Expedition for firewall and network device configuration management. The lack of available patches at the time of disclosure increases the urgency for interim mitigations.

Potential Impact

The impact of CVE-2024-9465 is severe for organizations using Palo Alto Networks Expedition, as attackers can gain unauthorized access to highly sensitive information such as password hashes, usernames, device configurations, and API keys. This exposure can lead to credential compromise, unauthorized access to network devices, and potential lateral movement within enterprise networks. The ability to create and read arbitrary files on the system further increases the risk of system compromise, data exfiltration, and persistence mechanisms being established by attackers. Since Expedition is used to manage firewall configurations, a successful attack could undermine network security controls, potentially allowing attackers to manipulate firewall rules or disable protections. The vulnerability’s remote, unauthenticated nature means attackers can exploit it without prior access, increasing the likelihood of attacks against exposed Expedition instances. This can result in significant confidentiality breaches, operational disruptions, and increased risk of follow-on attacks targeting critical infrastructure and enterprise networks globally.

Mitigation Recommendations

1. Immediately restrict network access to the Palo Alto Networks Expedition management interface to trusted IP addresses only, using firewall rules or network segmentation. 2. Implement strict access controls and multi-factor authentication on any interfaces related to Expedition to reduce exposure. 3. Monitor logs and network traffic for unusual SQL queries or file access patterns indicative of exploitation attempts. 4. Regularly back up Expedition configuration and database files securely to enable recovery in case of compromise. 5. Coordinate with Palo Alto Networks for timely patch deployment once a fix becomes available; prioritize patching Expedition version 1.2.0 installations. 6. Employ Web Application Firewalls (WAFs) or intrusion prevention systems (IPS) with SQL injection detection capabilities to block malicious payloads targeting Expedition. 7. Conduct security assessments and penetration testing focused on Expedition to identify and remediate other potential vulnerabilities. 8. Educate network and security teams about this vulnerability to ensure rapid detection and response to suspicious activity.

Pro Console: star threats, build custom feeds, automate alerts via Slack, email & webhooks.Upgrade to Pro

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2024-10-03T11:35:12.544Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68f7d9b8247d717aace26cc2

Added to database: 10/21/2025, 7:06:32 PM

Last enriched: 2/27/2026, 5:05:16 PM

Last updated: 3/25/2026, 4:47:13 AM

Views: 157

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses