Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Ensure that all network access to Expedition is restricted to only authorized users, hosts, and networks. If you are not actively using Expedition, make sure that your Expedition software is shut down.
Link | Providers |
---|---|
https://security.paloaltonetworks.com/PAN-SA-2025-0001 |
![]() ![]() |
Mon, 13 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 11 Jan 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An SQL injection vulnerability in Palo Alto Networks Expedition enables an authenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. This vulnerability also enables attackers to create and read arbitrary files on the Expedition system. | |
Title | Expedition: SQL Injection Vulnerability | |
Weaknesses | CWE-89 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-01-13T19:52:47.949Z
Reserved: 2024-12-20T23:22:57.417Z
Link: CVE-2025-0103

Updated: 2025-01-13T19:52:43.572Z

Status : Received
Published: 2025-01-11T03:15:22.020
Modified: 2025-01-11T03:15:22.020
Link: CVE-2025-0103

No data.

No data.