{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5910","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","state":"PUBLISHED","assignerShortName":"palo_alto","dateReserved":"2024-06-12T15:27:55.854Z","datePublished":"2024-07-10T18:39:26.006Z","dateUpdated":"2025-10-21T22:55:49.276Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","product":"Expedition","vendor":"Palo Alto Networks","versions":[{"changes":[{"at":"1.2.92","status":"unaffected"}],"lessThan":"1.2.92","status":"affected","version":"1.2","versionType":"custom"}]}],"credits":[{"lang":"en","type":"finder","value":"Brian Hysell (Synopsys CyRC)"}],"datePublic":"2024-07-10T16:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition.<br><br>Note: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue."}],"value":"Missing authentication for a critical function in Palo Alto Networks Expedition can lead to an Expedition admin account takeover for attackers with network access to Expedition.\n\nNote: Expedition is a tool aiding in configuration migration, tuning, and enrichment. Configuration secrets, credentials, and other data imported into Expedition is at risk due to this issue."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.<br>"}],"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}],"impacts":[{"capecId":"CAPEC-115","descriptions":[{"lang":"en","value":"CAPEC-115 Authentication Bypass"}]}],"metrics":[{"cvssV4_0":{"Automatable":"YES","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"LOW","attackRequirements":"NONE","attackVector":"NETWORK","baseScore":9.3,"baseSeverity":"CRITICAL","privilegesRequired":"NONE","providerUrgency":"RED","subAvailabilityImpact":"LOW","subConfidentialityImpact":"LOW","subIntegrityImpact":"LOW","userInteraction":"NONE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:H/VA:H/SC:L/SI:L/SA:L/AU:Y/R:U/V:D/RE:M/U:Red","version":"4.0","vulnAvailabilityImpact":"HIGH","vulnConfidentialityImpact":"HIGH","vulnIntegrityImpact":"HIGH","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-306","description":"CWE-306 Missing Authentication for Critical Function","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-07-10T18:39:26.006Z"},"references":[{"tags":["vendor-advisory"],"url":"https://security.paloaltonetworks.com/CVE-2024-5910"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This issue is fixed in Expedition 1.2.92 and all later versions.<br>"}],"value":"This issue is fixed in Expedition 1.2.92 and all later versions."}],"source":{"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-07-10T16:00:00.000Z","value":"Initial publication"}],"title":"Expedition: Missing Authentication Leads to Admin Account Takeover","workarounds":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Ensure networks access to Expedition is restricted to authorized users, hosts, or networks.<br>"}],"value":"Ensure networks access to Expedition is restricted to authorized users, hosts, or networks."}],"x_generator":{"engine":"Vulnogram 0.1.0-dev"}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"id":"CVE-2024-5910","role":"CISA Coordinator","options":[{"Exploitation":"active"},{"Automatable":"yes"},{"Technical Impact":"total"}],"version":"2.0.3","timestamp":"2024-11-07T04:55:50.697197Z"}}},{"other":{"type":"kev","content":{"dateAdded":"2024-11-07","reference":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-5910"}}}],"affected":[{"cpes":["cpe:2.3:a:paloaltonetworks:expedition:*:*:*:*:*:*:*:*"],"vendor":"paloaltonetworks","product":"expedition","versions":[{"status":"affected","version":"1.2","lessThan":"1.2.92","versionType":"custom"}],"defaultStatus":"unaffected"}],"references":[{"url":"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2024-5910","tags":["government-resource"]}],"timeline":[{"time":"2024-11-07T00:00:00.000Z","lang":"en","value":"CVE-2024-5910 added to CISA KEV"}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2025-10-21T22:55:49.276Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-11-08T16:40:17.301Z"},"references":[{"url":"https://www.horizon3.ai/attack-research/palo-alto-expedition-from-n-day-to-full-compromise"},{"tags":["vendor-advisory","x_transferred"],"url":"https://security.paloaltonetworks.com/CVE-2024-5910"}],"title":"CVE Program Container","x_generator":{"engine":"ADPogram 0.0.1"}}]}}