CVE-2025-0107

9.8 CRITICAL

📋 TL;DR

An unauthenticated OS command injection vulnerability in Palo Alto Networks Expedition allows attackers to execute arbitrary commands as the www-data user. This can lead to theft of sensitive data including cleartext passwords, device configurations, and API keys for PAN-OS firewalls. Organizations using Expedition for firewall migration and management are affected.

💻 Affected Systems

Products:
  • Palo Alto Networks Expedition
Versions: All versions prior to the fixed release
Operating Systems: Linux-based Expedition appliance
Default Config Vulnerable: ⚠️ Yes
Notes: Expedition is typically used for firewall migration and configuration management, often containing sensitive firewall credentials.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of Expedition server leading to credential theft, lateral movement to managed firewalls, and potential network-wide compromise.

🟠

Likely Case

Data exfiltration of firewall credentials and configurations, enabling further attacks against the firewall infrastructure.

🟢

If Mitigated

Limited impact if Expedition is isolated, monitored, and access is restricted to trusted networks only.

🌐 Internet-Facing: HIGH - Unauthenticated exploitation allows remote attackers to gain initial foothold.
🏢 Internal Only: HIGH - Even internally, unauthenticated access enables privilege escalation and data theft.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

OS command injection vulnerabilities are typically easy to exploit once the injection point is identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check PAN-SA-2025-0001 for specific fixed version

Vendor Advisory: https://security.paloaltonetworks.com/PAN-SA-2025-0001

Restart Required: Yes

Instructions:

1. Review PAN-SA-2025-0001 advisory. 2. Download and install the fixed Expedition version from Palo Alto support portal. 3. Restart Expedition services. 4. Verify no unauthorized changes occurred pre-patch.

🔧 Temporary Workarounds

Network Isolation

all

Restrict network access to Expedition to only trusted management networks

Configure firewall rules to limit Expedition access to specific source IPs/networks

Access Control

all

Implement additional authentication layers before Expedition

Deploy VPN or reverse proxy with authentication in front of Expedition

🧯 If You Can't Patch

  • Immediately isolate Expedition from internet and restrict to minimal necessary internal access
  • Monitor Expedition logs aggressively for suspicious command execution patterns

🔍 How to Verify

Check if Vulnerable:

Check Expedition version against advisory PAN-SA-2025-0001. If pre-fix version, assume vulnerable.

Check Version:

Check Expedition web interface or appliance management console for version information

Verify Fix Applied:

Verify Expedition version matches or exceeds the fixed version specified in PAN-SA-2025-0001

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in Expedition logs
  • Unexpected www-data user activity
  • Suspicious outbound connections from Expedition

Network Indicators:

  • Unexpected traffic from Expedition to external IPs
  • Anomalous authentication attempts from Expedition to managed firewalls

SIEM Query:

source="expedition" AND (process="bash" OR process="sh" OR cmdline="*;*" OR cmdline="*|*" OR cmdline="*`*`)

🔗 References

📤 Share & Export