Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

Palo Alto Networks, SonicWall, and Aviatrix Controllers Patch Critical Flaws in Latest Software Updates


Recent software updates from Palo Alto Networks, SonicWall, and Aviatrix aim to strengthen the security posture of its customers by addressing multiple critical flaws that could be exploited by attackers to gain unauthorized access to sensitive data. Read more about these critical patches and how they can help protect against known vulnerabilities.

  • Palo Alto Networks, SonicWall, and Aviatrix have released software patches to address high-severity vulnerabilities in their systems.
  • Patches aim to rectify multiple critical flaws that could be exploited by attackers to gain unauthorized access to sensitive data.
  • Palo Alto Networks has patched SQL injection vulnerability (CVE-2025-0103) and reflected cross-site scripting (XSS) vulnerability in its Expedition system.
  • SonicWall has released patches for multiple critical flaws, including authentication bypass vulnerability (CVE-2024-53704) and elevated privilege escalation vulnerability (CVE-2024-53706).
  • Aviatrix has addressed a maximum severity security flaw impacting Aviatrix Controller with a CVSS score of 10.0.


  • In a significant push to strengthen the security posture of its customers, Palo Alto Networks, SonicWall, and Aviatrix have collectively released software patches to address several high-severity vulnerabilities in their respective systems. The latest updates aim to rectify multiple critical flaws that could be exploited by attackers to gain unauthorized access to sensitive data.

    At the forefront of this effort is Palo Alto Networks, which has taken proactive steps to remediate security vulnerabilities in its Expedition migration tool. In a public advisory released recently, the company revealed that it had identified several high-severity bugs in the tool, including an SQL injection vulnerability (CVE-2025-0103) with a CVSS score of 7.8. This particular flaw enables authenticated attackers to reveal sensitive data, such as password hashes, usernames, and device configurations.

    In addition to this critical bug, Palo Alto Networks has also patched another significant vulnerability in the Expedition system, namely a reflected cross-site scripting (XSS) vulnerability (CVE-2025-0104) with a CVSS score of 4.7. This flaw allows attackers to execute malicious JavaScript code in the context of an authenticated user's browser, potentially leading to phishing attacks and browser-session theft.

    Furthermore, Palo Alto Networks has also addressed another critical vulnerability in its Expedition system, known as an arbitrary file deletion vulnerability (CVE-2025-0105) with a CVSS score of 2.7. This flaw enables unauthenticated attackers to delete arbitrary files accessible to the www-data user on the host file system.

    Not content with just addressing vulnerabilities within its own systems, Palo Alto Networks has also taken steps to strengthen the security posture of its customers by releasing patches for related vulnerabilities in its PAN-OS software. Specifically, this includes a vulnerability known as an operating system (OS) command injection vulnerability (CVE-2025-0107) with a CVSS score of 2.3. This flaw enables authenticated attackers to run arbitrary OS commands as the www-data user in Expedition, which results in the disclosure of sensitive data.

    SonicWall has also taken action to address security vulnerabilities within its systems. In a move aimed at strengthening the security posture of its customers, SonicWall has released patches for multiple critical flaws in its SonicOS operating system. Specifically, this includes two significant vulnerabilities, namely an authentication bypass vulnerability (CVE-2024-53704) with a CVSS score of 8.2 and an elevated privilege escalation vulnerability (CVE-2024-53706) with a CVSS score of 7.8.

    The first of these vulnerabilities is related to the SSLVPN authentication mechanism, which allows a remote attacker to bypass authentication. In other words, this flaw enables attackers to gain unauthorized access to sensitive data without needing to provide valid login credentials.

    In addition to this critical bug, SonicWall has also patched another significant vulnerability in its Gen7 SonicOS Cloud platform NSv (AWS and Azure editions only). Specifically, this includes a remote authenticated local low-privileged attacker privilege escalation vulnerability with a CVSS score of 7.8. This flaw enables attackers to elevate their privileges to root, potentially leading to code execution.

    Lastly, Aviatrix has taken action to address a critical security vulnerability within its systems. In a recent public advisory released by the company, it revealed that it had identified a maximum severity security flaw impacting Aviatrix Controller (CVE-2024-50603) with a CVSS score of 10.0. This particular flaw could be exploited by attackers to gain arbitrary code execution.

    According to Jakub Korepta, a security researcher who discovered the vulnerability, the issue is rooted in certain API endpoints that do not sanitize user-supplied parameters. Specifically, this includes two endpoints known as "list_flightpath_destination_instances" and "flightpath_connection_test". These endpoints enable attackers to remotely execute arbitrary code due to improper neutralization of special elements used in OS commands.

    Aviatrix has since released patches for versions 7.1.4191 and 7.2.4996, which are intended to address the identified vulnerability.

    In conclusion, these latest software updates from Palo Alto Networks, SonicWall, and Aviatrix aim to strengthen the security posture of its customers by addressing multiple critical flaws that could be exploited by attackers to gain unauthorized access to sensitive data. It is essential for users to take steps to apply these patches as soon as possible, particularly in light of the lack of evidence suggesting that any of these vulnerabilities have been exploited in the wild.



    Related Information:

  • https://thehackernews.com/2025/01/major-vulnerabilities-patched-in.html

  • https://nvd.nist.gov/vuln/detail/CVE-2025-0103

  • https://www.cvedetails.com/cve/CVE-2025-0103/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-0104

  • https://www.cvedetails.com/cve/CVE-2025-0104/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-0105

  • https://www.cvedetails.com/cve/CVE-2025-0105/

  • https://nvd.nist.gov/vuln/detail/CVE-2025-0107

  • https://www.cvedetails.com/cve/CVE-2025-0107/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-53704

  • https://www.cvedetails.com/cve/CVE-2024-53704/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-53706

  • https://www.cvedetails.com/cve/CVE-2024-53706/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-50603.

  • https://www.cvedetails.com/cve/CVE-2024-50603./


  • Published: Thu Jan 9 13:19:38 2025 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us