Tuesday, April 15, 2025
HomeCVE/vulnerabilityCISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities

CISA Warns of Actors Exploiting Two Palo Alto Networks Vulnerabilities

Published on

SIEM as a Service

Follow Us on Google News

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an urgent alert and added two new vulnerabilities related to Palo Alto Networks to its Known Exploited Vulnerabilities Catalog.

These vulnerabilities, CVE-2024-9463 and CVE-2024-9465, are reportedly actively exploited by malicious cyber actors. CISA emphasizes that both vulnerabilities pose significant risks, particularly to federal systems.

CVE-2024-9463: Palo Alto Networks Expedition OS Command Injection Vulnerability

The first vulnerability, CVE-2024-9463, is an OS Command Injection flaw in Palo Alto Networks’ Expedition tool, which could allow attackers to execute arbitrary code on the affected system.

- Advertisement - Google News

This type of vulnerability is particularly dangerous because it grants threat actors the ability to take control of a system and launch further attacks, escalating their access across the network.

Free Ultimate Continuous Security Monitoring Guide - Download Here (PDF)

CVE-2024-9465: Palo Alto Networks Expedition SQL Injection Vulnerability

The second vulnerability, CVE-2024-9465, is an SQL Injection vulnerability in the same Expedition tool.

This flaw allows attackers to manipulate database queries, potentially stealing, modifying, or deleting sensitive data.

SQL Injection vulnerabilities are a common attack vector for cybercriminals, making this a critical issue for organizations using the impacted versions of Expedition.

Federal Civilian Executive Branch (FCEB) agencies are required to address these vulnerabilities by the established deadlines.

The Known Exploited Vulnerabilities Catalog, created through BOD 22-01, is a dynamic list that serves as a critical resource for organizations looking to mitigate cyber risks.

It includes vulnerabilities that are actively exploited and pose a significant threat to federal networks.

While BOD 22-01 directly applies to federal agencies, CISA strongly urges all organizations, both public and private, to prioritize the timely remediation of vulnerabilities listed in the catalog.

Organizations should incorporate these steps as part of their comprehensive vulnerability management strategies to reduce exposure to cyberattacks.

Analyze Unlimited Phishing & Malware with ANY.RUN For Free - 14 Days Free Trial.



Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Paragon Hard Disk Manager Flaw Enables Privilege Escalation and DoS Attacks

Paragon Software’s widely used Hard Disk Manager (HDM) product line has been found to contain five...

Hertz Data Breach Exposes Customer Personal Information to Hackers

The Hertz Corporation has confirmed that sensitive personal information belonging to customers of its...

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their...

CentreStack 0-Day Exploit Enables Remote Code Execution on Web Servers

A critical 0-day vulnerability has been disclosed in CentreStack, a popular enterprise cloud storage...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

Paragon Hard Disk Manager Flaw Enables Privilege Escalation and DoS Attacks

Paragon Software’s widely used Hard Disk Manager (HDM) product line has been found to contain five...

Hertz Data Breach Exposes Customer Personal Information to Hackers

The Hertz Corporation has confirmed that sensitive personal information belonging to customers of its...

The Future of Authentication: Moving Beyond Passwords

Traditional passwords have been the cornerstone of digital security for six decades, but their...