-1.8 C
United States of America
Friday, January 10, 2025

Main Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers


Jan 09, 2025Ravie LakshmananVulnerability / Endpoint Safety

Main Vulnerabilities Patched in SonicWall, Palo Alto Expedition, and Aviatrix Controllers

Palo Alto Networks has launched software program patches to deal with a number of safety flaws in its Expedition migration software, together with a high-severity bug that an authenticated attacker might exploit to entry delicate knowledge.

“A number of vulnerabilities within the Palo Alto Networks Expedition migration software allow an attacker to learn Expedition database contents and arbitrary information, in addition to create and delete arbitrary information on the Expedition system,” the corporate stated in an advisory.

“These information embrace data comparable to usernames, cleartext passwords, gadget configurations, and gadget API keys for firewalls working PAN-OS software program.”

Cybersecurity

Expedition, a free software provided by Palo Alto Networks to facilitate migration from different firewall distributors to its personal platform, reached end-of-life (EoL) as of December 31, 2024. The checklist of flaws is as follows –

  • CVE-2025-0103 (CVSS rating: 7.8) – An SQL injection vulnerability that permits an authenticated attacker to disclose Expedition database contents, comparable to password hashes, usernames, gadget configurations, and gadget API keys, in addition to create and browse arbitrary information
  • CVE-2025-0104 (CVSS rating: 4.7) – A mirrored cross-site scripting (XSS) vulnerability that permits attackers to execute malicious JavaScript code within the context of an authenticated consumer’s browser if that authenticated consumer clicks a malicious hyperlink that enables phishing assaults and will result in browser-session theft
  • CVE-2025-0105 (CVSS rating: 2.7) – An arbitrary file deletion vulnerability that permits an unauthenticated attacker to delete arbitrary information accessible to the www-data consumer on the host file system
  • CVE-2025-0106 (CVSS rating: 2.7) – A wildcard enlargement vulnerability that enables an unauthenticated attacker to enumerate information on the host file system
  • CVE-2025-0107 (CVSS rating: 2.3) – An working system (OS) command injection vulnerability that permits an authenticated attacker to run arbitrary OS instructions because the www-data consumer in Expedition, which ends up in the disclosure of usernames, cleartext passwords, gadget configurations, and gadget API keys for firewalls working PAN-OS software program

Palo Alto Networks stated the vulnerabilities have been addressed in model 1.2.100 (CVE-2025-0103, CVE-2025-0104, and CVE-2025-0107) and 1.2.101 (CVE-2025-0105 and CVE-2025-0106), and that it doesn’t intend to launch any further updates or safety fixes.

As workarounds, it is beneficial to make sure that all community entry to Expedition is restricted to solely approved customers, hosts, and networks, or shut down the service if it isn’t in use.

SonicWalls Releases SonicOS Patches

The event coincides with SonicWall delivery patches to remediate a number of flaws in SonicOS, two of which may very well be abused to attain authentication bypass and privilege escalation, respectively –

  • CVE-2024-53704 (CVSS rating: 8.2) – An Improper Authentication vulnerability within the SSLVPN authentication mechanism that enables a distant attacker to bypass authentication.
  • CVE-2024-53706 (CVSS rating: 7.8) – A vulnerability within the Gen7 SonicOS Cloud platform NSv (AWS and Azure editions solely) that enables a distant authenticated native low-privileged attacker to raise privileges to root and doubtlessly result in code execution.
Cybersecurity

Whereas there isn’t any proof that any of the aforementioned vulnerabilities have been exploited within the wild, it is important that customers take steps to use the most recent fixes as quickly as attainable.

Crucial Flaw in Aviatrix Controller Detailed

The updates additionally come as Polish cybersecurity firm Securing detailed a most severity safety flaw impacting Aviatrix Controller (CVE-2024-50603, CVSS rating: 10.0) that may very well be exploited to acquire arbitrary code execution. It impacts variations 7.x by means of 7.2.4820.

The flaw, which is rooted in the truth that sure code segments in an API endpoint don’t sanitize user-supplied parameters (“list_flightpath_destination_instances” and “flightpath_connection_test”), has been addressed in variations 7.1.4191 or 7.2.4996.

“As a result of improper neutralization of particular components utilized in an OS command, an unauthenticated attacker is ready to remotely execute arbitrary code,” safety researcher Jakub Korepta stated.

Discovered this text attention-grabbing? Comply with us on Twitter and LinkedIn to learn extra unique content material we publish.



Related Articles

LEAVE A REPLY

Please enter your comment!
Please enter your name here

Latest Articles