Palo Alto Networks has launched software program patches to deal with a number of safety flaws in its Expedition migration device, together with a high-severity bug that an authenticated attacker may exploit to entry delicate knowledge.
“Multiple vulnerabilities in the Palo Alto Networks Expedition migration tool enable an attacker to read Expedition database contents and arbitrary files, as well as create and delete arbitrary files on the Expedition system,” the corporate mentioned in an advisory.
“These files include information such as usernames, cleartext passwords, device configurations, and device API keys for firewalls running PAN-OS software.”
Expedition, a free device supplied by Palo Alto Networks to facilitate migration from different firewall distributors to its personal platform, reached end-of-life (EoL) as of December 31, 2024. The record of flaws is as follows –
- CVE-2025-0103 (CVSS rating: 7.8) – An SQL injection vulnerability that allows an authenticated attacker to disclose Expedition database contents, equivalent to password hashes, usernames, system configurations, and system API keys, in addition to create and skim arbitrary recordsdata
- CVE-2025-0104 (CVSS rating: 4.7) – A mirrored cross-site scripting (XSS) vulnerability that allows attackers to execute malicious JavaScript code within the context of an authenticated consumer’s browser if that authenticated consumer clicks a malicious hyperlink that enables phishing assaults and will result in browser-session theft
- CVE-2025-0105 (CVSS rating: 2.7) – An arbitrary file deletion vulnerability that allows an unauthenticated attacker to delete arbitrary recordsdata accessible to the www-data consumer on the host file system
- CVE-2025-0106 (CVSS rating: 2.7) – A wildcard growth vulnerability that enables an unauthenticated attacker to enumerate recordsdata on the host file system
- CVE-2025-0107 (CVSS rating: 2.3) – An working system (OS) command injection vulnerability that allows an authenticated attacker to run arbitrary OS instructions because the www-data consumer in Expedition, which ends up in the disclosure of usernames, cleartext passwords, system configurations, and system API keys for firewalls working PAN-OS software program
Palo Alto Networks mentioned the vulnerabilities have been addressed in model 1.2.100 (CVE-2025-0103, CVE-2025-0104, and CVE-2025-0107) and 1.2.101 (CVE-2025-0105 and CVE-2025-0106), and that it doesn’t intend to launch any further updates or safety fixes.
As workarounds, it is really useful to make sure that all community entry to Expedition is restricted to solely approved customers, hosts, and networks, or shut down the service if it is not in use.
SonicWalls Releases SonicOS Patches
The event coincides with SonicWall delivery patches to remediate a number of flaws in SonicOS, two of which could possibly be abused to attain authentication bypass and privilege escalation, respectively –
- CVE-2024-53704 (CVSS rating: 8.2) – An Improper Authentication vulnerability within the SSLVPN authentication mechanism that enables a distant attacker to bypass authentication.
- CVE-2024-53706 (CVSS rating: 7.8) – A vulnerability within the Gen7 SonicOS Cloud platform NSv (AWS and Azure editions solely) that enables a distant authenticated native low-privileged attacker to raise privileges to root and probably result in code execution.
Whereas there is no such thing as a proof that any of the aforementioned vulnerabilities have been exploited within the wild, it is important that customers take steps to use the most recent fixes as quickly as attainable.
Essential Flaw in Aviatrix Controller Detailed
The updates additionally come as Polish cybersecurity firm Securing detailed a most severity safety flaw impacting Aviatrix Controller (CVE-2024-50603, CVSS rating: 10.0) that could possibly be exploited to acquire arbitrary code execution. It impacts variations 7.x by 7.2.4820.
The flaw, which is rooted in the truth that sure code segments in an API endpoint don’t sanitize user-supplied parameters (“list_flightpath_destination_instances” and “flightpath_connection_test”), has been addressed in variations 7.1.4191 or 7.2.4996.
“Due to the improper neutralization of special elements used in an OS command, an unauthenticated attacker is able to remotely execute arbitrary code,” safety researcher Jakub Korepta mentioned.