{"uuid": "0ee38b24-0d6c-4787-b1b4-ad8e16b534a9", "vulnerability": {"vulnId": "CVE-2024-9465", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "0ee38b24-0d6c-4787-b1b4-ad8e16b534a9"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2024-11-14T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2024-11-14T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2024-11-14T00:00:00Z"}, "scope": {"notes": "KEV entry: Palo Alto Networks Expedition SQL Injection Vulnerability | Affected: Palo Alto Networks / Expedition | Description: Palo Alto Networks Expedition contains a SQL injection vulnerability that allows an unauthenticated attacker to reveal Expedition database contents, such as password hashes, usernames, device configurations, and device API keys. With this, attackers can also create and read arbitrary files on the Expedition system. | Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable. | Due date: 2024-12-05 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://security.paloaltonetworks.com/PAN-SA-2024-0010 ; https://nvd.nist.gov/vuln/detail/CVE-2024-9465"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-89"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "Expedition", "due_date": "2024-12-05", "date_added": "2024-11-14", "vendorProject": "Palo Alto Networks", "vulnerabilityName": "Palo Alto Networks Expedition SQL Injection Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2024-9465", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2024-9465"}]}
