fbpx

Get a free penetration test now! Start Now

Vulnerability Patch Updates for SonicWall, Palo Alto Expedition, and Aviatrix Controllers

Table of Contents

Get Started in No Time!

Several resolutions to vulnerabilities in the Expedition migration tool, which is produced by Palo Alto Networks, have been announced; one such bugs is a critical vulnerability that allows hackers access to private information. If these bugs remained unpatched, it would bring a grave security predicament for users attempting to switch to Palo Alto’s platform utilizing such a product for “migration”.

Key vulnerabilities addressed include:

  • CVE-2025-0103 (CVSS 7.8): SQL injection vulnerability enabling database access, disclosure of sensitive information, and file manipulation.
  • CVE-2025-0104 (CVSS 4.7): Cross-site scripting flaw exploitable through malicious links, leading to phishing attacks or session theft.
  • CVE-2025-0105 (CVSS 2.7): Arbitrary file deletion vulnerability for unauthenticated attackers.
  • CVE-2025-0106 (CVSS 2.7): Wildcard expansion issue allowing file enumeration.
  • CVE-2025-0107 (CVSS 2.3): OS command injection flaw permitting the execution of arbitrary commands and disclosure of credentials.

Patches have been issued in versions 1.2.100 and 1.2.101, with no further updates planned, as Expedition reached its end-of-life (EOL) on December 31, 2024. Users are advised to restrict network access or decommission the tool if no longer needed.

Penetration Testing Cost

SonicWall Addresses SonicOS Vulnerabilities

SonicWall has released fixes for multiple issues in its SonicOS software, including:

  • CVE-2024-53704 (CVSS 8.2): An authentication bypass in SSLVPN.
  • CVE-2024-53706 (CVSS 7.8): Privilege escalation vulnerability in the Gen7 SonicOS Cloud platform for AWS and Azure.

Though these vulnerabilities have not been exploited in the wild, immediate patch application is strongly recommended.

Critical Flaw in Aviatrix Controller Highlighted

A maximum severity vulnerability (CVE-2024-50603, CVSS 10.0) has been identified in the Aviatrix Controller, impacting versions 7.x through 7.2.4820. The flaw stems from unsanitized input in specific API endpoints, enabling unauthenticated attackers to execute arbitrary code remotely.

The issue has been resolved in versions 7.1.4191 and 7.2.4996. Users are urged to update to these versions without delay.

Stay Protected with Bluefire Redteam

As cyber threats evolve, keeping systems updated with the latest patches is crucial. Bluefire Redteam offers tailored vulnerability management, penetration testing, and incident response services to help safeguard your organization.

📞 Ready to secure your systems? Contact us today!
Let us help you identify and mitigate vulnerabilities before attackers do. Reach out to us at [email protected] or visit www.bluefire-redteam.com to learn more!

Detect Vulnerabilities and Remediate in Real-Time.

What are you looking for?

Let us help you find the right cybersecurity solution for your organisation.