Metrics
Affected Vendors & Products
Solution
No solution given by the vendor.
Workaround
Ensure that all network access to Expedition is restricted to only authorized users, hosts, and networks. If you are not actively using Expedition, make sure that your Expedition software is shut down.
Link | Providers |
---|---|
https://security.paloaltonetworks.com/PAN-SA-2025-0001 |
![]() ![]() |
Mon, 13 Jan 2025 20:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|
Sat, 11 Jan 2025 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | A wildcard expansion vulnerability in Palo Alto Networks Expedition allows an unauthenticated attacker to enumerate files on the host filesystem. | |
Title | Expedition: Wildcard Expansion Vulnerability | |
Weaknesses | CWE-155 | |
References |
| |
Metrics |
cvssV4_0
|

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2025-01-13T19:48:42.286Z
Reserved: 2024-12-20T23:23:08.270Z
Link: CVE-2025-0106

Updated: 2025-01-13T19:48:38.269Z

Status : Received
Published: 2025-01-11T03:15:22.490
Modified: 2025-01-11T03:15:22.490
Link: CVE-2025-0106

No data.

No data.