Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Ensure that all network access to Expedition is restricted to only authorized users, hosts, and networks. If you are not actively using Expedition, make sure that your Expedition software is shut down.
Link | Providers |
---|---|
https://security.paloaltonetworks.com/PAN-SA-2025-0001 |
![]() ![]() |
Mon, 13 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 11 Jan 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | An arbitrary file deletion vulnerability in Palo Alto Networks Expedition enables an unauthenticated attacker to delete arbitrary files accessible to the www-data user on the host filesystem. | |
Title | Expedition: Arbitrary File Deletion Vulnerability | |
Weaknesses | CWE-73 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-01-13T19:50:31.391Z
Reserved: 2024-12-20T23:23:06.874Z
Link: CVE-2025-0105

Updated: 2025-01-13T19:48:52.264Z

Status : Received
Published: 2025-01-11T03:15:22.317
Modified: 2025-01-11T03:15:22.317
Link: CVE-2025-0105

No data.

No data.