Close Menu
    DevStackTipsDevStackTips
    • Home
    • News & Updates
      1. Tech & Work
      2. View All

      Sunshine And March Vibes (2025 Wallpapers Edition)

      May 16, 2025

      The Case For Minimal WordPress Setups: A Contrarian View On Theme Frameworks

      May 16, 2025

      How To Fix Largest Contentful Paint Issues With Subpart Analysis

      May 16, 2025

      How To Prevent WordPress SQL Injection Attacks

      May 16, 2025

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025

      Minecraft licensing robbed us of this controversial NFL schedule release video

      May 16, 2025
    • Development
      1. Algorithms & Data Structures
      2. Artificial Intelligence
      3. Back-End Development
      4. Databases
      5. Front-End Development
      6. Libraries & Frameworks
      7. Machine Learning
      8. Security
      9. Software Engineering
      10. Tools & IDEs
      11. Web Design
      12. Web Development
      13. Web Security
      14. Programming Languages
        • PHP
        • JavaScript
      Featured

      The power of generators

      May 16, 2025
      Recent

      The power of generators

      May 16, 2025

      Simplify Factory Associations with Laravel’s UseFactory Attribute

      May 16, 2025

      This Week in Laravel: React Native, PhpStorm Junie, and more

      May 16, 2025
    • Operating Systems
      1. Windows
      2. Linux
      3. macOS
      Featured

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025
      Recent

      Microsoft has closed its “Experience Center” store in Sydney, Australia — as it ramps up a continued digital growth campaign

      May 16, 2025

      Bing Search APIs to be “decommissioned completely” as Microsoft urges developers to use its Azure agentic AI alternative

      May 16, 2025

      Microsoft might kill the Surface Laptop Studio as production is quietly halted

      May 16, 2025
    • Learning Resources
      • Books
      • Cheatsheets
      • Tutorials & Guides
    Home»Development»Patch Now! Critical Flaw Found in Palo Alto Networks Expedition Migration Tool

    Patch Now! Critical Flaw Found in Palo Alto Networks Expedition Migration Tool

    July 11, 2024

    Palo Alto Networks has issued security updates to address vulnerabilities impacting its products, including a critical vulnerability in its Expedition migration tool that could grant attackers complete administrator control.

    This critical vulnerability, designated CVE-2024-5910, boasts a CVSS score of 9.3 and stems from a lack of authentication within the Expedition migration tool. This missing safeguard could allow malicious actors with network access to Expedition to seize administrative accounts.

    All Expedition Versions Before 1.2.92 At Risk

    The ramifications of a compromised Expedition migration tool admin account are significant. According to the Palo Alto Networks advisory, “configuration secrets, credentials, and other data imported into Expedition is at risk” and would be exposed to attackers who exploit this flaw.

    The vulnerability affects all versions of Expedition prior to 1.2.92, which incorporates a fix. Thankfully, there’s no evidence of this vulnerability being actively exploited. However, Palo Alto Networks strongly recommends updating Expedition to the latest version to mitigate potential threats.

    As a temporary workaround, Palo Alto Networks advises restricting network access to Expedition solely to authorized users, devices and networks.

    Palo Alto Firewalls Face Blast-RADIUS

    In addition to the Expedition migration tool flaw, Palo Alto Networks also addressed a recently discovered vulnerability in the RADIUS protocol, dubbed Blast-RADIUS. This vulnerability, tracked as CVE-2024-3596, could enable attackers to bypass authentication procedures on Palo Alto Networks firewalls leveraging RADIUS servers.

    Technical details delve into how Blast-RADIUS exploits a scenario where an attacker positions themselves between a Palo Alto Networks PAN-OS firewall and a RADIUS server, launching a so-called “man-in-the-middle” attack. This maneuver allows the attacker to potentially “escalate privileges to ‘superuser’ when RADIUS authentication is in use and either CHAP or PAP is selected in the RADIUS server profile,” as outlined in the Palo Alto Networks advisory.

    For those unfamiliar, CHAP (Challenge-Handshake Authentication Protocol) and PAP (Password Authentication Protocol) are two authentication protocols that, according to the advisory, “should not be used unless they are encapsulated by an encrypted tunnel” due to their lack of inherent Transport Layer Security (TLS) encryption. Luckily, PAN-OS firewalls configured to utilize EAP-TTLS with PAP for RADIUS server authentication are not susceptible to this exploit.

    “Palo Alto Networks is aware of proof of concept code demonstrating how to exploit this generic issue.”

    Palo Alto Networks has identified several PAN-OS versions impacted by Blast-RADIUS, with fixes already available for most.

    The following PAN-OS versions are impacted:

    PAN-OS 11.1 (fixed in versions >= 11.1.3)
    PAN-OS 11.0 (fixed in versions >= 11.0.4-h4)
    PAN-OS 10.2 (fixed in versions >= 10.2.10)
    PAN-OS 10.1 (fixed in versions >= 10.1.14)
    PAN-OS 9.1 (fixed in versions >= 9.1.19)

    A fix for Prisma Access is anticipated by July 30.

    Source: Read More

    Hostinger
    Facebook Twitter Reddit Email Copy Link
    Previous ArticleBuild secure multi-party computation (MPC) wallets using AWS Nitro Enclaves
    Next Article Citrix, CISA and NCSC Warn of a Critical-Severity Bug in NetScaler Console

    Related Posts

    Security

    Nmap 7.96 Launches with Lightning-Fast DNS and 612 Scripts

    May 16, 2025
    Common Vulnerabilities and Exposures (CVEs)

    CVE-2025-47916 – Invision Community Themeeditor Remote Code Execution

    May 16, 2025
    Leave A Reply Cancel Reply

    Continue Reading

    Microsoft just fixed this Windows 11 bug, but I bet you wish it hadn’t

    News & Updates

    A Package to Manage Model Status in Laravel

    Development

    CVE-2025-37793 – Intel ASoC avs Null Pointer Dereference Vulnerability

    Common Vulnerabilities and Exposures (CVEs)

    Samsung Galaxy Z Fold 6 vs Z Fold 5: Which premium model should you buy?

    Development

    Highlights

    CVE-2025-48127 – “App Cheap Push Notification Authorization Bypass”

    May 16, 2025

    CVE ID : CVE-2025-48127

    Published : May 16, 2025, 4:15 p.m. | 47 minutes ago

    Description : Missing Authorization vulnerability in App Cheap Push notification for Mobile and Web app allows Exploiting Incorrectly Configured Access Control Security Levels. This issue affects Push notification for Mobile and Web app: from n/a through 2.0.3.

    Severity: 6.5 | MEDIUM

    Visit the link for more details, such as CVSS details, affected products, timeline, and more…

    Bulk SMS: The Ultimate Tool for Business Communication

    February 3, 2025

    The 16-inch AI PC deal saves you $200 on the chip that “challenges Snapdragon X and stomps Intel Meteor Lake”

    February 11, 2025

    Build private and secure enterprise generative AI apps with Amazon Q Business and AWS IAM Identity Center

    April 30, 2024
    © DevStackTips 2025. All rights reserved.
    • Contact
    • Privacy Policy

    Type above and press Enter to search. Press Esc to cancel.