Vulnerabilites related to paloaltonetworks - cortex_xdr_agent
Vulnerability from fkie_nvd
Published
2022-01-12 18:15
Modified
2024-11-21 06:37
Severity ?
6.1 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
7.1 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H
Summary
An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACA2B1DA-165F-44A9-B173-F39842438E69", "versionEndExcluding": "5.0.12", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD9113FA-3169-4D5C-84F6-A3AC4A510347", "versionEndExcluding": "6.1.9", "versionStartIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0E24F90-79DD-47F5-BC32-35E32E260BDD", "versionEndExcluding": "7.2.4", "versionStartIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "239EDF44-FCDF-45AC-AE50-D57E6FD7539B", "versionEndExcluding": "7.3.2", "versionStartIncluding": "7.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de resoluci\u00f3n de enlaces inapropiada antes del acceso a archivos en el agente Cortex XDR de Palo Alto Networks en plataformas Windows que permite a un usuario local eliminar archivos arbitrarios del sistema y afectar a la integridad del sistema o causar una condici\u00f3n de denegaci\u00f3n de servicio. Este problema afecta: Agente Cortex XDR versiones 5.0 anteriores al agente Cortex XDR 5.0.12; Agente Cortex XDR versiones 6.1 anteriores al agente Cortex XDR 6.1.9; Agente Cortex XDR versiones7.2 anteriores al agente Cortex XDR 7.2.4; Agente Cortex XDR versiones7.3 anteriores al agente Cortex XDR 7.3.2" } ], "id": "CVE-2022-0012", "lastModified": "2024-11-21T06:37:48.800", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 4.2, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-12T18:15:08.010", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0012" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0012" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-09 18:15
Modified
2024-11-21 05:24
Severity ?
Summary
An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "A75398A3-ED40-4983-A80A-ECAE760B5400", "versionEndExcluding": "5.0.10", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "CC3EA409-30E8-4E2D-B1B5-F2C946F3613B", "versionEndExcluding": "6.1.7", "versionStartIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "762B2DF4-229D-4755-A0B3-47D4BFD8C21A", "versionEndExcluding": "7.0.3", "versionStartIncluding": "7.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2A974F5-3BEE-496F-8833-F7DC4D86C56D", "versionEndExcluding": "7.1.2", "versionStartIncluding": "7.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software\u0027s internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2." }, { "lang": "es", "value": "Un manejo inapropiado de una vulnerabilidad de condiciones excepcionales en Cortex XDR Agent permite a un usuario de Windows autenticado localmente crear archivos en el directorio de programa interno del software que impide que se inicie Cortex XDR Agent.\u0026#xa0;La condici\u00f3n excepcional es persistente e impide que Cortex XDR Agent se inicie cuando se reinicia el software o la m\u00e1quina.\u0026#xa0;Este problema afecta a: Cortex XDR Agent versiones 5.0 anteriores a 5.0.10;\u0026#xa0;Cortex XDR Agent versiones 6.1 anteriores a 6.1.7;\u0026#xa0;Cortex XDR Agent versiones 7.0 anteriores a 7.0.3;\u0026#xa0;Cortex XDR Agent versiones 7.1 anteriores a 7.1.2" } ], "id": "CVE-2020-2020", "lastModified": "2024-11-21T05:24:28.077", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 2.1, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2020-12-09T18:15:10.663", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2020" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2020" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-09-13 17:15
Modified
2024-11-21 08:16
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to disable the agent.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | 7.5.102 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "847D7E4D-E088-45F4-8843-56F0F2131D69", "versionEndIncluding": "5.0.12.22203", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:-:*:*:*", "matchCriteriaId": "5F40DE3D-6113-4823-99EC-730BCA0EA408", "versionEndExcluding": "7.9.3", "versionStartIncluding": "7.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:content_update:*:*:*", "matchCriteriaId": "186B115E-3534-4A84-B663-BF8BB7118EA7", "versionEndExcluding": "7.9.101", "versionStartIncluding": "7.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "FE005B8A-9F4D-49B1-9A41-4711380D9FE3", "versionEndExcluding": "8.0.2", "versionStartIncluding": "8.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.102:*:*:*:content_update:*:*:*", "matchCriteriaId": "4F3F0B52-38A7-4CA4-9727-F105A626F6EB", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to disable the agent.\n\n" }, { "lang": "es", "value": "Un problema con un mecanismo de protecci\u00f3n en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite a un usuario local desactivar el agente." } ], "id": "CVE-2023-3280", "lastModified": "2024-11-21T08:16:55.323", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-09-13T17:15:09.963", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-3280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-3280" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-755" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-08 18:15
Modified
2024-11-21 07:36
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to execute privileged cytool commands that disable or uninstall the agent.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "213B017D-D17C-460A-BC5C-6B6A4BFFA8E4", "versionEndExcluding": "5.0.12.22203", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:critical_environment:*:*:*", "matchCriteriaId": "C72CD204-E989-4990-A4AF-BFE65817CD31", "versionEndIncluding": "7.5.101", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to execute privileged cytool commands that disable or uninstall the agent.\n" } ], "id": "CVE-2023-0002", "lastModified": "2024-11-21T07:36:22.187", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-08T18:15:11.683", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0002" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0002" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-693" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-12 17:15
Modified
2024-11-21 09:48
Severity ?
Summary
A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:critical_environment:*:*:*", "matchCriteriaId": "E7510DB5-E41B-484D-8BE8-12F7BECA18C6", "versionEndExcluding": "7.9.102", "versionStartIncluding": "7.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "84B436C7-8804-4860-BA71-F9052BD339F6", "versionEndExcluding": "8.2.3", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "12439BD7-6910-403C-B970-AE14A841DEBD", "versionEndExcluding": "8.3.1", "versionStartIncluding": "8.3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit." }, { "lang": "es", "value": "Una vulnerabilidad de escalada de privilegios (PE) en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite a un usuario local ejecutar programas con privilegios elevados. Sin embargo, la ejecuci\u00f3n requiere que el usuario local aproveche con \u00e9xito una condici\u00f3n de ejecuci\u00f3n, lo que hace que esta vulnerabilidad sea dif\u00edcil de explotar." } ], "id": "CVE-2024-5907", "lastModified": "2024-11-21T09:48:33.463", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.0, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "automatable": "NO", "availabilityRequirements": "NOT_DEFINED", "baseScore": 5.2, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "recovery": "USER", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "HIGH", "subsequentSystemConfidentiality": "HIGH", "subsequentSystemIntegrity": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-06-12T17:15:53.127", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5907" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5907" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-06-10 13:15
Modified
2024-11-21 06:20
Severity ?
Summary
A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "85F52B2D-FE23-48FA-9287-9ABEFCE6329D", "versionEndExcluding": "5.0.11", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "5968299F-4BEF-4595-95B0-C499847DF5A8", "versionEndExcluding": "6.1.8", "versionStartIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "607575B3-B1D1-4491-9C96-6721771AB28D", "versionEndExcluding": "7.2.3", "versionStartIncluding": "7.2", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de escalada de privilegios local en el agente Palo Alto Networks Cortex XDR agent en plataformas Windows que permite a un usuario local de Windows autenticado ejecutar programas con privilegios SYSTEM. Esto requiere que el usuario tenga el privilegio de crear archivos en el directorio root de Windows o de manipular valores clave del registro. Este problema afecta: Cortex XDR agent versiones 5.0 versiones anteriores a Cortex XDR agent 5.0.11; Cortex XDR agent versiones 6.1 versiones anteriores a Cortex XDR agent 6.1.8; Cortex XDR agent versiones 7.2 versiones anteriores a Cortex XDR agent 7.2.3; Todas las versiones de Cortex XDR agent 7.2 sin la versi\u00f3n de actualizaci\u00f3n de contenidos 171 o una versi\u00f3n posterior" } ], "id": "CVE-2021-3041", "lastModified": "2024-11-21T06:20:49.373", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2021-06-10T13:15:08.420", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3041" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3041" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-12 18:15
Modified
2024-11-21 06:37
Severity ?
5.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACA2B1DA-165F-44A9-B173-F39842438E69", "versionEndExcluding": "5.0.12", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD9113FA-3169-4D5C-84F6-A3AC4A510347", "versionEndExcluding": "6.1.9", "versionStartIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0E24F90-79DD-47F5-BC32-35E32E260BDD", "versionEndExcluding": "7.2.4", "versionStartIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "239EDF44-FCDF-45AC-AE50-D57E6FD7539B", "versionEndExcluding": "7.3.2", "versionStartIncluding": "7.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de exposici\u00f3n de informaci\u00f3n de archivos en el agente Cortex XDR de Palo Alto Networks que permite a un atacante local leer el contenido de archivos arbitrarios en el sistema con altos privilegios cuando es generado un archivo de soporte. Este problema afecta: Agente Cortex XDR versiones 5.0 anteriores al agente Cortex XDR 5.0.12; Agente Cortex XDR versiones 6.1 anteriores al agente Cortex XDR 6.1.9; Agente Cortex XDR versiones 7.2 anteriores al agente Cortex XDR 7.2.4; Agente Cortex XDR versiones 7.3 anteriores al agente Cortex XDR 7.3.2" } ], "id": "CVE-2022-0013", "lastModified": "2024-11-21T06:37:48.937", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 2.1, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-12T18:15:08.077", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0013" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0013" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-538" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 06:37
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1:-:*:*:*:*:*:*", "matchCriteriaId": "8535E8E2-188C-460B-86A8-F463854F5DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1:content_update330:*:*:*:*:*:*", "matchCriteriaId": "09A12884-47E6-451E-9751-F871F12692E7", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.4:content_update330:*:*:*:*:*:*", "matchCriteriaId": "6F522F4D-8740-41C2-A662-2D3FADB98ADB", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.4:hotfix:*:*:*:*:*:*", "matchCriteriaId": "559A6865-F8E3-4F6B-A53B-5EA48C5B9120", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:-:*:*:*:*:*:*", "matchCriteriaId": "0B027DB3-7A70-443B-B5F4-B66A3BCCF2A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:content_update330:*:*:*:*:*:*", "matchCriteriaId": "7103C435-D4CC-46BE-8487-03ADF0135792", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:hotfix:*:*:*:*:*:*", "matchCriteriaId": "14B92689-A030-44F3-9B66-2E003198A407", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.6:-:*:*:*:*:*:*", "matchCriteriaId": "920FAB2B-4AEC-48FD-9744-617BC6C494CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.6:content_update330:*:*:*:*:*:*", "matchCriteriaId": "4F81B9E1-E1A1-4910-AE0C-65BC8F554A47", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.7:-:*:*:*:*:*:*", "matchCriteriaId": "2BECB228-650F-448A-931D-DFA7D097E41E", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.7:content_update330:*:*:*:*:*:*", "matchCriteriaId": "1FC042EE-8F41-466C-9D85-556092102EE7", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.8:-:*:*:*:*:*:*", "matchCriteriaId": "30B091F7-AE11-4540-A945-7100ACE812AC", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.8:content_update330:*:*:*:*:*:*", "matchCriteriaId": "5F880FD5-FCC6-4FEE-AB48-088C9C431E64", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.9:-:*:*:*:*:*:*", "matchCriteriaId": "6792CE52-83C7-4601-B9E5-54FF77103DB0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.9:content_update330:*:*:*:*:*:*", "matchCriteriaId": "600E93EA-21E5-41F1-977A-43F0513C2468", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.1:-:*:*:*:*:*:*", "matchCriteriaId": "5257930C-27F0-4A1E-B5C9-D3D76C27715D", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.1:content_update330:*:*:*:*:*:*", "matchCriteriaId": "0C01C824-2578-4C11-9578-731B597BECB1", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.2:-:*:*:*:*:*:*", "matchCriteriaId": "CA4B14D7-5E03-4635-9D75-CEEF0D913EFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.2:content_update330:*:*:*:*:*:*", "matchCriteriaId": "737275AC-C43D-4636-AE0E-BB24A192C525", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.3:-:*:*:*:*:*:*", "matchCriteriaId": "799B0C1C-8963-4A04-A3A2-E1D97C6BE467", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.3:content_update330:*:*:*:*:*:*", "matchCriteriaId": "D1221A81-E602-4629-93B8-3ABCA7C1F6C0", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.4:-:*:*:*:*:*:*", "matchCriteriaId": "210954DD-8719-4212-8725-3201EF7AF9D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.4:content_update330:*:*:*:*:*:*", "matchCriteriaId": "603A11D1-B95D-48E2-B61C-012B3675D4B7", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5:-:*:*:content_engine:*:*:*", "matchCriteriaId": "B6E273B6-A3A4-47EF-9E37-B123B61ECE23", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.1:-:*:*:*:*:*:*", "matchCriteriaId": "716232DD-F8C1-43A3-870A-A6C19D7A4416", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.1:content_update330:*:*:*:*:*:*", "matchCriteriaId": "8E023342-504F-4DF4-8D2F-F824DE72757D", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.2:-:*:*:*:*:*:*", "matchCriteriaId": "D63504E2-E27A-4714-AB1C-CC67675E47E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.2:content_update330:*:*:*:*:*:*", "matchCriteriaId": "5399BD2D-B6F0-4368-BBAA-D25C3A5B7BAA", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.3:-:*:*:*:*:*:*", "matchCriteriaId": "D8D5A99A-BB66-4C4D-BFAB-5B07B0A98BAD", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.3:content_update330:*:*:*:*:*:*", "matchCriteriaId": "42502AD9-5F5E-441C-B32D-FAEDA4D2BBF9", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.1:-:*:*:*:*:*:*", "matchCriteriaId": "B5D4BBBE-57DE-438A-97B3-29C59EA8C48D", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.1:content_update330:*:*:*:*:*:*", "matchCriteriaId": "13CBA514-D865-4C9F-A2FE-D2FA3B289DC5", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.2:-:*:*:*:*:*:*", "matchCriteriaId": "1E4BCC91-31AB-4318-8A1F-D043392F09E2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.2:content_update330:*:*:*:*:*:*", "matchCriteriaId": "3E421078-40E0-4D3D-A6A3-825EF9452E99", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7:-:*:*:*:*:*:*", "matchCriteriaId": "EEDE5C5B-48F9-4211-9F98-085C3C5E19FE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7:content_update330:*:*:*:*:*:*", "matchCriteriaId": "A9D89CF1-E2F8-4498-859F-D6FB4F9DC82B", "vulnerable": false }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7.1:-:*:*:*:*:*:*", "matchCriteriaId": "C2927A74-24A5-459B-9D61-2718643F3338", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7.1:content_update330:*:*:*:*:*:*", "matchCriteriaId": "483211AE-3205-4DCD-B602-EE707684C464", "vulnerable": false } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de escalada de privilegios (PE) local en el software Cortex XDR agent de Palo Alto Networks en Windows que permite a un usuario local autenticado con privilegios de creaci\u00f3n de archivos en el directorio root de Windows (como C:\\) ejecutar un programa con altos privilegios. Este problema afecta a todas las versiones de Cortex XDR agent sin la actualizaci\u00f3n de contenido 330 o una versi\u00f3n posterior de actualizaci\u00f3n de contenido" } ], "id": "CVE-2022-0026", "lastModified": "2024-11-21T06:37:50.823", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:09.287", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0026" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0026" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-282" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 06:37
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts: All versions of the Cortex XDR agent when upgrading to Cortex XDR agent 7.7.0 on Windows; Cortex XDR agent 7.7.0 without content update 500 or a later version on Windows. This issue does not impact other platforms or other versions of the Cortex XDR agent.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "600071E7-A60E-49D4-AD97-4208767FF38C", "versionEndExcluding": "7.7.1.62043", "versionStartIncluding": "7.7.0", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts: All versions of the Cortex XDR agent when upgrading to Cortex XDR agent 7.7.0 on Windows; Cortex XDR agent 7.7.0 without content update 500 or a later version on Windows. This issue does not impact other platforms or other versions of the Cortex XDR agent." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de escalada de privilegios (PE) local en el software Cortex XDR agent de Palo Alto Networks en Windows que permite a un usuario local autenticado con privilegios de creaci\u00f3n de archivos en el directorio root de Windows (como C:\\) ejecutar un programa con altos privilegios. Este problema afecta a: Todas las versiones de Cortex XDR agent cuando es actualizado al agente Cortex XDR 7.7.0 en Windows; Cortex XDR agent versi\u00f3n XDR 7.7.0 sin la actualizaci\u00f3n de contenido 500 o una versi\u00f3n posterior en Windows. Este problema no afecta a otras plataformas ni a otras versiones del Cortex XDR agent" } ], "id": "CVE-2022-0025", "lastModified": "2024-11-21T06:37:50.693", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:09.227", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0025" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0025" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-07-15 17:15
Modified
2024-11-21 06:20
Severity ?
Summary
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | 6.1 | |
paloaltonetworks | cortex_xdr_agent | 7.2 | |
paloaltonetworks | cortex_xdr_agent | 7.2 | |
paloaltonetworks | cortex_xdr_agent | 7.2 | |
paloaltonetworks | cortex_xdr_agent | 7.3 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1:-:*:*:*:*:*:*", "matchCriteriaId": "8535E8E2-188C-460B-86A8-F463854F5DFE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.2:-:*:*:*:*:*:*", "matchCriteriaId": "4952CB88-7B75-41D9-9387-7B5DD2DF0FEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.2:content_update149:*:*:*:*:*:*", "matchCriteriaId": "38C8BB0C-FC56-4006-9B75-8E7652723A92", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.2:content_update150:*:*:*:*:*:*", "matchCriteriaId": "0DA4AB8A-30E4-43FE-9C68-84BB59B4473E", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.3:-:*:*:*:*:*:*", "matchCriteriaId": "B43721E6-6944-4B88-A4CE-4A0917B02CDA", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de escalada de privilegios (PE) local en Palo Alto Networks Cortex XDR agent en plataformas Windows, que permite a un usuario local de Windows autenticado ejecutar programas con privilegios SYSTEM. Explotando esta vulnerabilidad requiere a un usuario tener privilegios de creaci\u00f3n de archivos en el directorio root de Windows (como C:\\). Este problema afecta a: Todas las versiones del agente Cortex XDR 6.1 sin la actualizaci\u00f3n de contenido 181 o una versi\u00f3n posterior; Todas las versiones del agente Cortex XDR 7.2 sin la actualizaci\u00f3n de contenido 181 o una versi\u00f3n posterior; Todas las versiones del agente Cortex XDR 7.3 sin la actualizaci\u00f3n de contenido 181 o una versi\u00f3n posterior. Unas versiones del agente Cortex XDR 5.0 no se ven afectadas por este problema. Las actualizaciones de contenido son requeridas para resolver este problema y se aplican autom\u00e1ticamente para el agente" } ], "id": "CVE-2021-3042", "lastModified": "2024-11-21T06:20:49.573", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2021-07-15T17:15:08.717", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3042" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3042" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-12 17:15
Modified
2024-11-21 09:48
Severity ?
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:content_update:*:*:*", "matchCriteriaId": "09772885-7300-4BB8-8E6B-D4CE4474D479", "versionEndExcluding": "7.9.102", "versionStartIncluding": "7.9.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "D085EDE6-405B-4AC0-9C86-0104B6FA3AE0", "versionEndExcluding": "8.1.2", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "0BB9F55A-17D4-47B4-AFCE-EE2AB1B67FF5", "versionEndExcluding": "8.2.1", "versionStartIncluding": "8.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability." }, { "lang": "es", "value": "Un problema con un mecanismo de protecci\u00f3n en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite que un usuario local de Windows con pocos privilegios interrumpa algunas funciones del agente. Sin embargo, no pueden interrumpir los mecanismos de protecci\u00f3n del agente Cortex XDR utilizando esta vulnerabilidad." } ], "id": "CVE-2024-5905", "lastModified": "2024-11-21T09:48:33.170", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "automatable": "YES", "availabilityRequirements": "NOT_DEFINED", "baseScore": 2.0, "baseSeverity": "LOW", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "recovery": "USER", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:Y/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "LOW", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "LOW" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-06-12T17:15:52.847", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5905" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5905" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-346" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-12 18:15
Modified
2024-11-21 06:37
Severity ?
6.7 (Medium) - CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
7.3 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
Summary
An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACA2B1DA-165F-44A9-B173-F39842438E69", "versionEndExcluding": "5.0.12", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD9113FA-3169-4D5C-84F6-A3AC4A510347", "versionEndExcluding": "6.1.9", "versionStartIncluding": "6.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "D0E24F90-79DD-47F5-BC32-35E32E260BDD", "versionEndExcluding": "7.2.4", "versionStartIncluding": "7.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "239EDF44-FCDF-45AC-AE50-D57E6FD7539B", "versionEndExcluding": "7.3.2", "versionStartIncluding": "7.3", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de ruta de b\u00fasqueda no confiable en el agente Cortex XDR de Palo Alto Networks que permite a un atacante local con privilegios de creaci\u00f3n de archivos en el directorio root de Windows (como C:\\) almacenar un programa que puede ser ejecutado involuntariamente por otro usuario local cuando \u00e9ste usa una sesi\u00f3n de Live Terminal. Este problema afecta: Agente Cortex XDR versiones 5.0 anteriores al agente Cortex XDR 5.0.12; Agente Cortex XDR versiones 6.1 anteriores al agente Cortex XDR 6.1.9; Agente Cortex XDR versiones 7.2 anteriores al agente Cortex XDR 7.2.4; Agente Cortex XDR versiones 7.3 anteriores al agente Cortex XDR 7.3.2" } ], "id": "CVE-2022-0014", "lastModified": "2024-11-21T06:37:49.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-12T18:15:08.133", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0014" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0014" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-12-09 18:15
Modified
2024-11-21 05:24
Severity ?
Summary
A local privilege escalation vulnerability exists in Palo Alto Networks Cortex XDR Agent on the Windows platform that allows an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory. This issue impacts: All versions of Cortex XDR Agent 7.1 with content update 149 and earlier versions; All versions of Cortex XDR Agent 7.2 with content update 149 and earlier versions.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | 7.1 | |
paloaltonetworks | cortex_xdr_agent | 7.1 | |
paloaltonetworks | cortex_xdr_agent | 7.2 | |
paloaltonetworks | cortex_xdr_agent | 7.2 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "51CD85EF-7F31-4892-9965-14C5A2067D64", "versionEndIncluding": "7.1.3", "versionStartIncluding": "7.1.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "0E95E445-35A7-4295-97A6-E2F918DA2B97", "versionEndIncluding": "7.2.2", "versionStartIncluding": "7.2.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.1:-:*:*:*:*:*:*", "matchCriteriaId": "952ED8D6-4208-4C8E-979F-F0B9086056FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.1:content_update149:*:*:*:*:*:*", "matchCriteriaId": "06456425-C7D6-4195-A1B0-60E621AF94AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.2:-:*:*:*:*:*:*", "matchCriteriaId": "4952CB88-7B75-41D9-9387-7B5DD2DF0FEE", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.2:content_update149:*:*:*:*:*:*", "matchCriteriaId": "38C8BB0C-FC56-4006-9B75-8E7652723A92", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation vulnerability exists in Palo Alto Networks Cortex XDR Agent on the Windows platform that allows an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory. This issue impacts: All versions of Cortex XDR Agent 7.1 with content update 149 and earlier versions; All versions of Cortex XDR Agent 7.2 with content update 149 and earlier versions." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de escalada de privilegios local en Palo Alto Networks Cortex XDR Agent en la plataforma Windows que permite a un usuario de Windows local autenticado ejecutar programas con privilegios SYSTEM.\u0026#xa0;Esto requiere que el usuario tenga el privilegio de crear archivos en el directorio root de Windows.\u0026#xa0;Este problema afecta: todas las versiones de Cortex XDR Agent 7.1 con la actualizaci\u00f3n de contenido 149 y versiones anteriores;\u0026#xa0;Todas las versiones de Cortex XDR Agent 7.2 con la actualizaci\u00f3n de contenido 149 y versiones anteriores" } ], "id": "CVE-2020-2049", "lastModified": "2024-11-21T05:24:33.057", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2020-12-09T18:15:10.817", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2049" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2049" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-06-12 17:15
Modified
2024-11-21 09:48
Severity ?
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:critical_environment:windows:*:*", "matchCriteriaId": "76F416A4-2527-4B52-BBED-FF648B8209B0", "versionEndExcluding": "7.9.102", "versionStartIncluding": "7.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:windows:*:*", "matchCriteriaId": "8E20EA13-B11E-4578-8DB1-AEBC51EAD4E1", "versionEndExcluding": "8.1.2", "versionStartIncluding": "8.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:windows:*:*", "matchCriteriaId": "E60C3C3C-01B8-4A72-B4B6-89BB374BBBB9", "versionEndExcluding": "8.2.1", "versionStartIncluding": "8.2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." }, { "lang": "es", "value": "Un problema con un mecanismo de protecci\u00f3n en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite que un usuario local de Windows con pocos privilegios deshabilite el agente. Este problema puede ser aprovechado por malware para desactivar el agente Cortex XDR y luego realizar actividades maliciosas." } ], "id": "CVE-2024-5909", "lastModified": "2024-11-21T09:48:33.737", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "automatable": "NO", "availabilityRequirements": "NOT_DEFINED", "baseScore": 6.8, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "recovery": "USER", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "HIGH", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-06-12T17:15:53.370", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5909" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5909" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-269" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-10-09 17:15
Modified
2024-10-15 18:38
Severity ?
Summary
A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@paloaltonetworks.com | https://security.paloaltonetworks.com/CVE-2024-9469 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | 8.3.0 | |
paloaltonetworks | cortex_xdr_agent | 8.4.0 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:critical_environment:*:*:*", "matchCriteriaId": "E7510DB5-E41B-484D-8BE8-12F7BECA18C6", "versionEndExcluding": "7.9.102", "versionStartIncluding": "7.9", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.3.0:*:*:*:-:*:*:*", "matchCriteriaId": "8632049D-4794-46B0-88A8-D14261C40620", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.4.0:*:*:*:-:*:*:*", "matchCriteriaId": "01CDA3EB-9E29-4A07-B9CF-219436C170D4", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." }, { "lang": "es", "value": "Un problema con un mecanismo de detecci\u00f3n en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite que un usuario con privilegios no administrativos de Windows deshabilite el agente. Este problema puede ser aprovechado por malware para deshabilitar el agente Cortex XDR y luego realizar una actividad maliciosa." } ], "id": "CVE-2024-9469", "lastModified": "2024-10-15T18:38:25.647", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "automatable": "NO", "availabilityRequirements": "NOT_DEFINED", "baseScore": 5.7, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "recovery": "USER", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "NONE", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "HIGH", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "NONE" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-10-09T17:15:20.770", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-9469" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-754" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2023-02-08 18:15
Modified
2024-11-21 07:36
Severity ?
6.0 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:critical_environment:*:*:*", "matchCriteriaId": "EC5B0E84-B9A5-4FE3-B2E5-A64AEF57BCF3", "versionEndExcluding": "7.5.101", "versionStartIncluding": "7.5", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent." } ], "id": "CVE-2023-0001", "lastModified": "2024-11-21T07:36:22.050", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.2, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2023-02-08T18:15:11.523", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0001" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0001" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-319" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-01-12 18:15
Modified
2024-11-21 06:37
Severity ?
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACA2B1DA-165F-44A9-B173-F39842438E69", "versionEndExcluding": "5.0.12", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "FD9113FA-3169-4D5C-84F6-A3AC4A510347", "versionEndExcluding": "6.1.9", "versionStartIncluding": "6.1", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9." }, { "lang": "es", "value": "Se presenta una vulnerabilidad de escalada de privilegios (PE) local en el agente Cortex XDR de Palo Alto Networks que permite a un usuario local autenticado ejecutar programas con privilegios elevados. Este problema afecta a: El agente Cortex XDR versiones 5.0 anteriores al agente Cortex XDR 5.0.12; el agente Cortex XDR versiones 6.1 anteriores al agente Cortex XDR 6.1.9" } ], "id": "CVE-2022-0015", "lastModified": "2024-11-21T06:37:49.263", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-01-12T18:15:08.197", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0015" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0015" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-427" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-09-11 17:15
Modified
2024-10-15 18:38
Severity ?
Summary
A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows administrator privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
References
▼ | URL | Tags | |
---|---|---|---|
psirt@paloaltonetworks.com | https://security.paloaltonetworks.com/CVE-2024-8690 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | 7.9.102 | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9.102:*:*:*:critical_environment:*:*:*", "matchCriteriaId": "DAD96F99-F6DD-4310-AC22-23354CB10FF8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows administrator privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." }, { "lang": "es", "value": "Un problema con un mecanismo de detecci\u00f3n en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite que un usuario con privilegios de administrador de Windows deshabilite el agente. Este problema puede ser aprovechado por malware para deshabilitar el agente Cortex XDR y luego realizar una actividad maliciosa." } ], "id": "CVE-2024-8690", "lastModified": "2024-10-15T18:38:32.260", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 4.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ], "cvssMetricV40": [ { "cvssData": { "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "automatable": "NO", "availabilityRequirements": "NOT_DEFINED", "baseScore": 5.6, "baseSeverity": "MEDIUM", "confidentialityRequirements": "NOT_DEFINED", "exploitMaturity": "NOT_DEFINED", "integrityRequirements": "NOT_DEFINED", "modifiedAttackComplexity": "NOT_DEFINED", "modifiedAttackRequirements": "NOT_DEFINED", "modifiedAttackVector": "NOT_DEFINED", "modifiedPrivilegesRequired": "NOT_DEFINED", "modifiedSubsequentSystemAvailability": "NOT_DEFINED", "modifiedSubsequentSystemConfidentiality": "NOT_DEFINED", "modifiedSubsequentSystemIntegrity": "NOT_DEFINED", "modifiedUserInteraction": "NOT_DEFINED", "modifiedVulnerableSystemAvailability": "NOT_DEFINED", "modifiedVulnerableSystemConfidentiality": "NOT_DEFINED", "modifiedVulnerableSystemIntegrity": "NOT_DEFINED", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "recovery": "USER", "safety": "NOT_DEFINED", "subsequentSystemAvailability": "LOW", "subsequentSystemConfidentiality": "NONE", "subsequentSystemIntegrity": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:L/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnerabilityResponseEffort": "MODERATE", "vulnerableSystemAvailability": "NONE", "vulnerableSystemConfidentiality": "NONE", "vulnerableSystemIntegrity": "HIGH" }, "source": "psirt@paloaltonetworks.com", "type": "Secondary" } ] }, "published": "2024-09-11T17:15:14.487", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-8690" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-440" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2022-09-14 17:15
Modified
2024-11-21 06:37
Severity ?
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
5.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Summary
An improper link resolution vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local attacker to read files on the system with elevated privileges when generating a tech support file.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
paloaltonetworks | cortex_xdr_agent | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "ACA2B1DA-165F-44A9-B173-F39842438E69", "versionEndExcluding": "5.0.12", "versionStartIncluding": "5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:critical_environment:*:*:*", "matchCriteriaId": "EC5B0E84-B9A5-4FE3-B2E5-A64AEF57BCF3", "versionEndExcluding": "7.5.101", "versionStartIncluding": "7.5", "vulnerable": true }, { "criteria": "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "5CD5FFFD-BCE2-43FB-806D-D839719671F3", "versionEndExcluding": "7.7.3", "versionStartIncluding": "7.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "An improper link resolution vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local attacker to read files on the system with elevated privileges when generating a tech support file." }, { "lang": "es", "value": "Una vulnerabilidad de resoluci\u00f3n de enlaces inapropiada en el agente Cortex XDR de Palo Alto Networks en dispositivos Windows permite a un atacante local leer archivos en el sistema con altos privilegios cuando es generado un archivo de soporte t\u00e9cnico" } ], "id": "CVE-2022-0029", "lastModified": "2024-11-21T06:37:51.280", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-09-14T17:15:10.110", "references": [ { "source": "psirt@paloaltonetworks.com", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0029" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0029" } ], "sourceIdentifier": "psirt@paloaltonetworks.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "psirt@paloaltonetworks.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
cve-2024-5909
Vulnerability from cvelistv5
Published
2024-06-12 16:29
Modified
2024-08-01 21:25
Severity ?
EPSS score ?
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2024-5909 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 8.2.0 < 8.2.1 Version: 8.1.0 < 8.1.2 Version: 7.9-CE < 7.9.102-CE |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5909", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T19:51:54.433806Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T19:52:05.711Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5909" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "8.4.0" }, { "status": "unaffected", "version": "8.3.0" }, { "changes": [ { "at": "8.2.1", "status": "unaffected" } ], "lessThan": "8.2.1", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "changes": [ { "at": "8.1.2", "status": "unaffected" } ], "lessThan": "8.1.2", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "changes": [ { "at": "7.9.102-CE", "status": "unaffected" } ], "lessThan": "7.9.102-CE", "status": "affected", "version": "7.9-CE", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Manuel Feifel of VUREX (InfoGuard AG) for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.\u003c/p\u003e" } ], "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-578", "descriptions": [ { "lang": "en", "value": "CAPEC-578 Disable Security Software" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 6.8, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:29:23.822Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5909" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions.\u003c/p\u003e" } ], "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-21835", "CPATR-21826" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Windows User Can Disable the Agent", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectedKeywords": [ "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE", "Cortex XDR Agent 7.5-CE", "Cortex XDR Agent 5.0", "Cortex XDR Agent" ], "affectsSummary": { "affected": [ "None", "None", "\u003c 8.2.1 on Windows", "\u003c 8.1.2 on Windows", "\u003c 7.9.102-CE on Windows" ], "appliesTo": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "product_versions": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "unaffected": [ "All", "All", "\u003e= 8.2.1 on Windows", "\u003e= 8.1.2 on Windows", "\u003e= 7.9.102-CE on Windows" ], "unknown": [ "", "", "", "", "" ] }, "owner": "abaishya", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-CPATR-21826", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Local Windows User Can Disable the Agent" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "version_affected": "=", "version_name": "8.3", "version_value": "None" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.1" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.2", "version_value": "8.2.1" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.1", "version_value": "8.1.2" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.1", "version_value": "8.1.2" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "version_affected": "!", "version_name": "8.3", "version_value": "All" }, { "version_affected": "=", "version_name": "8.4", "version_value": "None" }, { "version_affected": "!", "version_name": "8.4", "version_value": "All" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Manuel Feifel of VUREX (InfoGuard AG) for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 6.8, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-CPATR-21826" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-21835", "CPATR-21826" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE", "Cortex XDR Agent 7.5-CE", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5909", "datePublished": "2024-06-12T16:29:23.822Z", "dateReserved": "2024-06-12T15:27:55.683Z", "dateUpdated": "2024-08-01T21:25:03.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3041
Vulnerability from cvelistv5
Published
2021-06-10 12:33
Modified
2024-09-16 22:01
Severity ?
EPSS score ?
Summary
A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2021-3041 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 5.0 < 5.0.11 Version: 6.1 < 6.1.8 Version: 7.2 < 7.2.3 or without content update 171 or later |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:45:50.941Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3041" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.0.11", "status": "unaffected" } ], "lessThan": "5.0.11", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.8", "status": "unaffected" } ], "lessThan": "6.1.8", "status": "affected", "version": "6.1", "versionType": "custom" }, { "changes": [ { "at": "7.2.3 with content update 171 or later", "status": "unaffected" } ], "lessThan": "7.2.3 or without content update 171 or later", "status": "affected", "version": "7.2", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was found by Robert McCallum of Palo Alto Networks during internal security review." } ], "datePublic": "2021-06-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-06-10T12:33:06", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3041" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.11, Cortex XDR agent 6.1.8, Cortex XDR agent 7.2.3, and all later Cortex XDR agent versions.\n\nContent updates are required to resolve this issue and are automatically applied for the agent." } ], "source": { "defect": [ "CPATR-12634", "CPATR-12507", "CPATR-11927" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2021-06-09T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Improper control of user-controlled file leads to local privilege escalation", "workarounds": [ { "lang": "en", "value": "This issue is mitigated by preventing local authenticated Windows users from creating files in the Windows root directory (such as C:\\) and ensuring they are unable to manipulate the Windows registry." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2021-06-09T16:00:00.000Z", "ID": "CVE-2021-3041", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Improper control of user-controlled file leads to local privilege escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.11" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.11" }, { "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.8" }, { "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.8" }, { "version_affected": "\u003c", "version_name": "7.2", "version_value": "7.2.3 or without content update 171 or later" }, { "version_affected": "!\u003e=", "version_name": "7.2", "version_value": "7.2.3 with content update 171 or later" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was found by Robert McCallum of Palo Alto Networks during internal security review." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2021-3041", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2021-3041" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.11, Cortex XDR agent 6.1.8, Cortex XDR agent 7.2.3, and all later Cortex XDR agent versions.\n\nContent updates are required to resolve this issue and are automatically applied for the agent." } ], "source": { "defect": [ "CPATR-12634", "CPATR-12507", "CPATR-11927" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2021-06-09T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "This issue is mitigated by preventing local authenticated Windows users from creating files in the Windows root directory (such as C:\\) and ensuring they are unable to manipulate the Windows registry." } ], "x_affectedList": [ "Cortex XDR Agent 7.2", "Cortex XDR Agent 6.1", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2021-3041", "datePublished": "2021-06-10T12:33:06.552120Z", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-09-16T22:01:54.695Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2020
Vulnerability from cvelistv5
Published
2020-12-09 18:00
Modified
2024-09-16 20:17
Severity ?
EPSS score ?
Summary
An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software's internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-2020 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.0 < 7.0.3 Version: 7.1 < 7.1.2 Version: 5.0 < 5.0.10 Version: 6.1 < 6.1.7 Patch: 7.2.0 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.594Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2020" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "7.0.3", "status": "unaffected" } ], "lessThan": "7.0.3", "status": "affected", "version": "7.0", "versionType": "custom" }, { "changes": [ { "at": "7.1.2", "status": "unaffected" } ], "lessThan": "7.1.2", "status": "affected", "version": "7.1", "versionType": "custom" }, { "changes": [ { "at": "5.0.10", "status": "unaffected" } ], "lessThan": "5.0.10", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.7", "status": "unaffected" } ], "lessThan": "6.1.7", "status": "affected", "version": "6.1", "versionType": "custom" }, { "lessThan": "7.2*", "status": "unaffected", "version": "7.2.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Paul van der Haas of Orange Cyberdefense for discovering and reporting this issue." } ], "datePublic": "2020-12-09T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software\u0027s internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-09T18:00:13", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2020" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR Agent 5.0.10, Cortex XDR Agent 6.1.7, Cortex XDR Agent 7.0.3, Cortex XDR Agent 7.1.2, and all later Cortex XDR Agent versions." } ], "source": { "defect": [ "CPATR-9871" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-12-09T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Exceptional condition denial-of-service (DoS)", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-12-09T17:00:00.000Z", "ID": "CVE-2020-2020", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Exceptional condition denial-of-service (DoS)" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.0", "version_value": "7.0.3" }, { "version_affected": "\u003c", "version_name": "7.1", "version_value": "7.1.2" }, { "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.10" }, { "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.7" }, { "version_affected": "!\u003e=", "version_name": "7.0", "version_value": "7.0.3" }, { "version_affected": "!\u003e=", "version_name": "7.1", "version_value": "7.1.2" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.10" }, { "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.7" }, { "version_affected": "!\u003e=", "version_name": "7.2", "version_value": "7.2.0" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Paul van der Haas of Orange Cyberdefense for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper handling of exceptional conditions vulnerability in Cortex XDR Agent allows a local authenticated Windows user to create files in the software\u0027s internal program directory that prevents the Cortex XDR Agent from starting. The exceptional condition is persistent and prevents Cortex XDR Agent from starting when the software or machine is restarted. This issue impacts: Cortex XDR Agent 5.0 versions earlier than 5.0.10; Cortex XDR Agent 6.1 versions earlier than 6.1.7; Cortex XDR Agent 7.0 versions earlier than 7.0.3; Cortex XDR Agent 7.1 versions earlier than 7.1.2." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-755 Improper Handling of Exceptional Conditions" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-2020", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-2020" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR Agent 5.0.10, Cortex XDR Agent 6.1.7, Cortex XDR Agent 7.0.3, Cortex XDR Agent 7.1.2, and all later Cortex XDR Agent versions." } ], "source": { "defect": [ "CPATR-9871" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-12-09T00:00:00", "value": "Initial publication" } ], "x_affectedList": [ "Cortex XDR Agent 7.1", "Cortex XDR Agent 7.0", "Cortex XDR Agent 6.1", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-2020", "datePublished": "2020-12-09T18:00:14.069887Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-16T20:17:18.893Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-8690
Vulnerability from cvelistv5
Published
2024-09-11 16:42
Modified
2024-09-11 18:24
Severity ?
EPSS score ?
Summary
A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows administrator privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.9.102-CE |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-8690", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-11T18:23:32.709813Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-11T18:24:05.107Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "8.5" }, { "status": "unaffected", "version": "8.4" }, { "status": "unaffected", "version": "8.3" }, { "status": "unaffected", "version": "8.3-CE" }, { "status": "unaffected", "version": "8.2" }, { "status": "affected", "version": "7.9.102-CE" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Ayman Sagy of CyberCX" } ], "datePublic": "2024-09-11T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows administrator privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." } ], "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows administrator privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\u003cbr\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-554", "descriptions": [ { "lang": "en", "value": "CAPEC-554 Functionality Bypass" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 5.6, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "subAvailabilityImpact": "LOW", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:H/UI:N/VC:N/VI:H/VA:N/SC:N/SI:N/SA:L/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "HIGH", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-440", "description": "CWE-440: Expected Behavior Violation", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-09-11T16:42:39.974Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2024-8690" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in Cortex XDR Agent 8.2, and all later Cortex XDR Agent versions.\u003cbr\u003e" } ], "value": "This issue is fixed in Cortex XDR Agent 8.2, and all later Cortex XDR Agent versions." } ], "source": { "defect": [ "CPATR-20644" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-09-11T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Windows Administrator Can Disable the Agent", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-8690", "datePublished": "2024-09-11T16:42:39.974Z", "dateReserved": "2024-09-11T08:21:15.662Z", "dateUpdated": "2024-09-11T18:24:05.107Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5905
Vulnerability from cvelistv5
Published
2024-06-12 16:20
Modified
2024-08-01 21:25
Severity ?
EPSS score ?
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2024-5905 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.9-CE < 7.9.102-CE Version: 8.1.0 < 8.1.2 Version: 8.2.0 < 8.2.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5905", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T17:58:42.722169Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T17:58:51.232Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5905" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "7.9.102-CE", "status": "unaffected" } ], "lessThan": "7.9.102-CE", "status": "affected", "version": "7.9-CE", "versionType": "custom" }, { "changes": [ { "at": "8.1.2", "status": "unaffected" } ], "lessThan": "8.1.2", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "changes": [ { "at": "8.2.1", "status": "unaffected" } ], "lessThan": "8.2.1", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "status": "unaffected", "version": "8.3.0" }, { "status": "unaffected", "version": "8.4.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Manuel Feifel of VUREX (InfoGuard AG) for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability.\u003c/p\u003e" } ], "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-578", "descriptions": [ { "lang": "en", "value": "CAPEC-578 Disable Security Software" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 2, "baseSeverity": "LOW", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:22:57.869Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5905" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions.\u003c/p\u003e" } ], "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-21727" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Windows User Can Disrupt Functionality of the Agent", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectsSummary": { "affected": [ "None", "None", "\u003c 8.2.1 on Windows", "\u003c 8.1.2 on Windows", "\u003c 7.9.102-CE on Windows" ], "appliesTo": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "product_versions": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "unaffected": [ "All", "All", "\u003e= 8.2.1 on Windows", "\u003e= 8.1.2 on Windows", "\u003e= 7.9.102-CE on Windows" ], "unknown": [ "", "", "", "", "" ] }, "owner": "abaishya", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-CPATR-21727", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Local Windows User Can Disrupt Functionality of the Agent" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.1", "version_value": "8.1.2" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.1", "version_value": "8.1.2" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.1" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.2", "version_value": "8.2.1" }, { "version_affected": "=", "version_name": "8.3", "version_value": "None" }, { "version_affected": "!", "version_name": "8.3", "version_value": "All" }, { "version_affected": "=", "version_name": "8.4", "version_value": "None" }, { "version_affected": "!", "version_name": "8.4", "version_value": "All" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Manuel Feifel of VUREX (InfoGuard AG) for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "YES", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 2, "baseSeverity": "LOW", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-346 Origin Validation Error" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-CPATR-21727" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-21727" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5905", "datePublished": "2024-06-12T16:20:35.039Z", "dateReserved": "2024-06-12T15:27:53.779Z", "dateUpdated": "2024-08-01T21:25:03.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0001
Vulnerability from cvelistv5
Published
2023-02-08 17:20
Modified
2024-08-02 04:54
Severity ?
EPSS score ?
Summary
An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR agent |
Version: 7.5 < 7.5.101-CE |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.569Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0001" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.9 All" }, { "status": "unaffected", "version": "7.8 All" }, { "changes": [ { "at": "7.5.101-CE", "status": "unaffected" } ], "lessThan": "7.5.101-CE", "status": "affected", "version": "7.5", "versionType": "custom" }, { "status": "unaffected", "version": "5.0 All" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Palo Alto Networks thanks Robert McCallum (M42D) for discovering and reporting this issue." } ], "datePublic": "2023-02-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent." } ], "value": "An information exposure vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local system administrator to disclose the admin password for the agent in cleartext, which bad actors can then use to execute privileged cytool commands that disable or uninstall the agent." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-319", "description": "CWE-319 Cleartext Transmission of Sensitive Information", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-11-21T18:25:00.000Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2023-0001" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in Cortex XDR agent 7.5.101-CE and all later supported Cortex XDR agent versions. (Cortex XDR agent 5.0 is not impacted.)\u003cbr\u003e\u003cbr\u003eAfter you upgrade to a fixed version of the Cortex XDR agent, you must change the agent admin password in case it was already disclosed to users." } ], "value": "This issue is fixed in Cortex XDR agent 7.5.101-CE and all later supported Cortex XDR agent versions. (Cortex XDR agent 5.0 is not impacted.)\n\nAfter you upgrade to a fixed version of the Cortex XDR agent, you must change the agent admin password in case it was already disclosed to users." } ], "source": { "defect": [ "CPATR-13152" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2023-02-08T17:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Cleartext Exposure of Agent Admin Password", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There are no known workarounds for this issue." } ], "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2023-0001", "datePublished": "2023-02-08T17:20:20.774Z", "dateReserved": "2022-10-27T18:47:48.958Z", "dateUpdated": "2024-08-02T04:54:32.569Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0014
Vulnerability from cvelistv5
Published
2022-01-12 17:30
Modified
2024-09-16 23:00
Severity ?
EPSS score ?
Summary
An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0014 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.2 < 7.2.4 Version: 7.3 < 7.3.2 Version: 5.0 < 5.0.12 Version: 6.1 < 6.1.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.475Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0014" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.4.*" }, { "status": "unaffected", "version": "7.5.*" }, { "status": "unaffected", "version": "7.6.*" }, { "changes": [ { "at": "7.2.4", "status": "unaffected" } ], "lessThan": "7.2.4", "status": "affected", "version": "7.2", "versionType": "custom" }, { "changes": [ { "at": "7.3.2", "status": "unaffected" } ], "lessThan": "7.3.2", "status": "affected", "version": "7.3", "versionType": "custom" }, { "changes": [ { "at": "5.0.12", "status": "unaffected" } ], "lessThan": "5.0.12", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.9", "status": "unaffected" } ], "lessThan": "6.1.9", "status": "affected", "version": "6.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was found by Robert McCallum of Palo Alto Networks during an internal security review." } ], "datePublic": "2022-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-426", "description": "CWE-426 Untrusted Search Path", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-12T17:30:18", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0014" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-12633" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Unintended Program Execution When Using Live Terminal Session", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-0014", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Unintended Program Execution When Using Live Terminal Session" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.2", "version_value": "7.2.4" }, { "version_affected": "\u003c", "version_name": "7.3", "version_value": "7.3.2" }, { "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.12" }, { "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.9" }, { "version_affected": "!\u003e=", "version_name": "7.2", "version_value": "7.2.4" }, { "version_affected": "!\u003e=", "version_name": "7.3", "version_value": "7.3.2" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.12" }, { "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.9" }, { "version_affected": "!", "version_name": "7.4", "version_value": "7.4.*" }, { "version_affected": "!", "version_name": "7.5", "version_value": "7.5.*" }, { "version_affected": "!", "version_name": "7.6", "version_value": "7.6.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was found by Robert McCallum of Palo Alto Networks during an internal security review." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "HIGH", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-426 Untrusted Search Path" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0014", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0014" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-12633" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 7.3", "Cortex XDR Agent 7.2", "Cortex XDR Agent 6.1", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0014", "datePublished": "2022-01-12T17:30:18.718839Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-16T23:00:50.618Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0015
Vulnerability from cvelistv5
Published
2022-01-12 17:30
Modified
2024-09-17 02:51
Severity ?
EPSS score ?
Summary
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0015 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 5.0 < 5.0.12 Version: 6.1 < 6.1.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.383Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0015" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.2.*" }, { "status": "unaffected", "version": "7.3.*" }, { "status": "unaffected", "version": "7.4.*" }, { "status": "unaffected", "version": "7.5.*" }, { "status": "unaffected", "version": "7.6.*" }, { "changes": [ { "at": "5.0.12", "status": "unaffected" } ], "lessThan": "5.0.12", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.9", "status": "unaffected" } ], "lessThan": "6.1.9", "status": "affected", "version": "6.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Xavier DANEST of Decathlon for discovering and reporting this issue." } ], "datePublic": "2022-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-12T17:30:20", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0015" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13405", "CPATR-9287" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: An Uncontrolled Search Path Element Leads to Local Privilege Escalation (PE) Vulnerability", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-0015", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: An Uncontrolled Search Path Element Leads to Local Privilege Escalation (PE) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.12" }, { "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.9" }, { "version_affected": "!", "version_name": "7.2", "version_value": "7.2.*" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.12" }, { "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.9" }, { "version_affected": "!", "version_name": "7.3", "version_value": "7.3.*" }, { "version_affected": "!", "version_name": "7.4", "version_value": "7.4.*" }, { "version_affected": "!", "version_name": "7.5", "version_value": "7.5.*" }, { "version_affected": "!", "version_name": "7.6", "version_value": "7.6.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Xavier DANEST of Decathlon for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0015", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0015" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13405", "CPATR-9287" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 6.1", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0015", "datePublished": "2022-01-12T17:30:20.503695Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-17T02:51:40.031Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-0002
Vulnerability from cvelistv5
Published
2023-02-08 17:21
Modified
2024-08-02 04:54
Severity ?
EPSS score ?
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to execute privileged cytool commands that disable or uninstall the agent.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR agent |
Version: 7.5 < 7.5.101-CE Version: 5.0 < 5.0.12.22203 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T04:54:32.601Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2023-0002" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.9 All" }, { "status": "unaffected", "version": "7.8 All" }, { "changes": [ { "at": "7.5.101-CE", "status": "unaffected" } ], "lessThan": "7.5.101-CE", "status": "affected", "version": "7.5", "versionType": "custom" }, { "changes": [ { "at": "5.0.12.22203", "status": "unaffected" } ], "lessThan": "5.0.12.22203", "status": "affected", "version": "5.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "user": "00000000-0000-4000-9000-000000000000", "value": "Palo Alto Networks thanks Fernando Romero de la Morena and Robert McCallum (M42D) for discovering and reporting this issue." } ], "datePublic": "2023-02-08T17:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to execute privileged cytool commands that disable or uninstall the agent.\u003cbr\u003e" } ], "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to execute privileged cytool commands that disable or uninstall the agent.\n" } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-693", "description": "CWE-693 Protection Mechanism Failure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-02-08T17:21:47.711Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2023-0002" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in Cortex XDR agent 5.0.12.22203, Cortex XDR agent 7.5.101-CE, and all later supported Cortex XDR agent versions." } ], "value": "This issue is fixed in Cortex XDR agent 5.0.12.22203, Cortex XDR agent 7.5.101-CE, and all later supported Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13215", "CPATR-13184" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2023-02-08T17:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Product Disruption by Local Windows User", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "There are no known workarounds for this issue." } ], "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2023-0002", "datePublished": "2023-02-08T17:21:47.711Z", "dateReserved": "2022-10-27T18:48:11.588Z", "dateUpdated": "2024-08-02T04:54:32.601Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0025
Vulnerability from cvelistv5
Published
2022-05-11 16:30
Modified
2024-09-17 02:42
Severity ?
EPSS score ?
Summary
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts: All versions of the Cortex XDR agent when upgrading to Cortex XDR agent 7.7.0 on Windows; Cortex XDR agent 7.7.0 without content update 500 or a later version on Windows. This issue does not impact other platforms or other versions of the Cortex XDR agent.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0025 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | Cortex XDR Agent |
Version: 7.7 < 7.7.1.62043 without CU-500 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.559Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0025" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "7.7.1.62043", "status": "unaffected" } ], "lessThan": "7.7.1.62043 without CU-500", "status": "affected", "version": "7.7", "versionType": "custom" } ] }, { "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.7.* with CU-500" }, { "status": "unaffected", "version": "7.6 all" }, { "status": "unaffected", "version": "7.5 CE all" }, { "status": "unaffected", "version": "7.4 all" }, { "status": "unaffected", "version": "7.5 all" }, { "status": "unaffected", "version": "6.1 all" }, { "status": "unaffected", "version": "5.0 all" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks its customers and external security researchers for discovering and reporting this issue." } ], "datePublic": "2022-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts: All versions of the Cortex XDR agent when upgrading to Cortex XDR agent 7.7.0 on Windows; Cortex XDR agent 7.7.0 without content update 500 or a later version on Windows. This issue does not impact other platforms or other versions of the Cortex XDR agent." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:30:24", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0025" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 7.7.0 with content update 500, Cortex XDR agent 7.7.1 build 7.7.1.62043, and all later Cortex XDR agent versions.\n\nEnsure that Cortex XDR agent is upgraded to Cortex XDR agent 7.7.1.62043 or a later build when upgrading Cortex XDR agent to Cortex XDR agent 7.7 to prevent exposure to this vulnerability during the upgrade process." } ], "source": { "defect": [ "CPATR-16696" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-05-11T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: An Uncontrolled Search Path Element Leads to Local Privilege Escalation (PE) Vulnerability", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-05-11T16:00:00.000Z", "ID": "CVE-2022-0025", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: An Uncontrolled Search Path Element Leads to Local Privilege Escalation (PE) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.7", "version_value": "7.7.1.62043 without CU-500" }, { "version_affected": "!", "version_name": "7.7", "version_value": "7.7.* with CU-500" }, { "version_affected": "!", "version_name": "7.6", "version_value": "all" }, { "version_affected": "!", "version_name": "7.5 CE", "version_value": "all" }, { "version_affected": "!", "version_name": "7.4", "version_value": "all" }, { "version_affected": "!", "version_name": "7.5", "version_value": "all" }, { "version_affected": "!", "version_name": "6.1", "version_value": "all" }, { "version_affected": "!", "version_name": "5.0", "version_value": "all" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.7", "version_value": "7.7.1.62043" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks its customers and external security researchers for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts: All versions of the Cortex XDR agent when upgrading to Cortex XDR agent 7.7.0 on Windows; Cortex XDR agent 7.7.0 without content update 500 or a later version on Windows. This issue does not impact other platforms or other versions of the Cortex XDR agent." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0025", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0025" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 7.7.0 with content update 500, Cortex XDR agent 7.7.1 build 7.7.1.62043, and all later Cortex XDR agent versions.\n\nEnsure that Cortex XDR agent is upgraded to Cortex XDR agent 7.7.1.62043 or a later build when upgrading Cortex XDR agent to Cortex XDR agent 7.7 to prevent exposure to this vulnerability during the upgrade process." } ], "source": { "defect": [ "CPATR-16696" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-05-11T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 7.7", "Cortex XDR Agent" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0025", "datePublished": "2022-05-11T16:30:24.228159Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-17T02:42:23.753Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2021-3042
Vulnerability from cvelistv5
Published
2021-07-15 16:45
Modified
2024-09-17 04:18
Severity ?
EPSS score ?
Summary
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2021-3042 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | Cortex XDR Agent | ||||||||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T16:45:50.872Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3042" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "5.0 all" } ] }, { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "affected", "version": "6.1.* without content update 181 or later" }, { "status": "unaffected", "version": "6.1.* with content update 181 or later" }, { "status": "affected", "version": "7.2.* without content update 181 or later" } ] }, { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.2.* with content update 181 or later" }, { "status": "unaffected", "version": "7.3.* with content update 181 or later" }, { "status": "affected", "version": "7.3.* without content update 181 or later" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Xavier DANEST of Decathlon for discovering and reporting this issue." } ], "datePublic": "2021-07-14T00:00:00", "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-07-15T16:45:12", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2021-3042" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 6.1, Cortex XDR agent 7.2, Cortex XDR agent 7.3, and all later Cortex XDR agent versions with content update 181 or later content updates.\n\nContent updates are required to resolve this issue and are automatically applied for the agent." } ], "source": { "defect": [ "CPATR-13407", "CPATR-11790", "CPATR-11572" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2021-07-14T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Improper Control of User-Controlled File Leads to Local Privilege Escalation", "workarounds": [ { "lang": "en", "value": "This issue is mitigated by preventing local authenticated Windows users from creating files in the Windows root directory (such as C:\\)." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2021-07-14T16:00:00.000Z", "ID": "CVE-2021-3042", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Improper Control of User-Controlled File Leads to Local Privilege Escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "version_affected": "!", "version_name": "5.0", "version_value": "all" }, { "platform": "Windows", "version_affected": "=", "version_name": "6.1", "version_value": "6.1.* without content update 181 or later" }, { "platform": "Windows", "version_affected": "!", "version_name": "6.1", "version_value": "6.1.* with content update 181 or later" }, { "platform": "Windows", "version_affected": "=", "version_name": "7.2", "version_value": "7.2.* without content update 181 or later" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.2", "version_value": "7.2.* with content update 181 or later" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.3", "version_value": "7.3.* with content update 181 or later" }, { "platform": "Windows", "version_affected": "=", "version_name": "7.3", "version_value": "7.3.* without content update 181 or later" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Xavier DANEST of Decathlon for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2021-3042", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2021-3042" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 6.1, Cortex XDR agent 7.2, Cortex XDR agent 7.3, and all later Cortex XDR agent versions with content update 181 or later content updates.\n\nContent updates are required to resolve this issue and are automatically applied for the agent." } ], "source": { "defect": [ "CPATR-13407", "CPATR-11790", "CPATR-11572" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2021-07-14T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "This issue is mitigated by preventing local authenticated Windows users from creating files in the Windows root directory (such as C:\\)." } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 7.3", "Cortex XDR Agent 7.2", "Cortex XDR Agent 6.1" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2021-3042", "datePublished": "2021-07-15T16:45:12.285628Z", "dateReserved": "2021-01-06T00:00:00", "dateUpdated": "2024-09-17T04:18:46.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-5907
Vulnerability from cvelistv5
Published
2024-06-12 16:26
Modified
2024-08-01 21:25
Severity ?
EPSS score ?
Summary
A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2024-5907 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.9-CE < 7.9.102-CE Version: 8.1.0 Version: 8.2.0 < 8.2.3 Version: 8.3.0 < 8.3.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5907", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-11-08T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T03:56:05.821Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5907" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "7.9.102-CE", "status": "unaffected" } ], "lessThan": "7.9.102-CE", "status": "affected", "version": "7.9-CE", "versionType": "custom" }, { "status": "affected", "version": "8.1.0" }, { "changes": [ { "at": "8.2.3", "status": "unaffected" } ], "lessThan": "8.2.3", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "changes": [ { "at": "8.3.1", "status": "unaffected" } ], "lessThan": "8.3.1", "status": "affected", "version": "8.3.0", "versionType": "custom" }, { "status": "unaffected", "version": "8.4.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Orange Cyberdefense Switzerland\u0027s Research Team for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.\u003c/p\u003e" } ], "value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 5.2, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:26:39.742Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5907" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024.\u003c/p\u003e" } ], "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024." } ], "source": { "defect": [ "CPATR-23348" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Privilege Escalation (PE) Vulnerability", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Current-Status": "Verify with Alain how they want to be acknowledged", "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectsSummary": { "affected": [ "None", "\u003c 8.3.1 on Windows", "\u003c 8.2.3 on Windows", "All", "\u003c 7.9.102-CE on Windows" ], "appliesTo": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "product_versions": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "unaffected": [ "All", "\u003e= 8.3.1 on Windows", "\u003e= 8.2.3 on Windows", "None", "\u003e= 7.9.102-CE on Windows" ], "unknown": [ "", "", "", "", "" ] }, "owner": "abaishya", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-CPATR-23348", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Local Privilege Escalation (PE) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.3" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.2", "version_value": "8.2.3" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.3", "version_value": "8.3.1" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.3", "version_value": "8.3.1" }, { "version_affected": "=", "version_name": "8.4", "version_value": "None" }, { "version_affected": "!", "version_name": "8.4", "version_value": "All" }, { "version_affected": "=", "version_name": "8.1", "version_value": "All" }, { "version_affected": "!", "version_name": "8.1", "version_value": "None" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Alain Mowat of Orange Cyberdefense for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 5.2, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-CPATR-23348" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024." } ], "source": { "defect": [ "CPATR-23348" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5907", "datePublished": "2024-06-12T16:26:39.742Z", "dateReserved": "2024-06-12T15:27:55.262Z", "dateUpdated": "2024-08-01T21:25:03.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0026
Vulnerability from cvelistv5
Published
2022-05-11 16:30
Modified
2024-09-17 01:26
Severity ?
EPSS score ?
Summary
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0026 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.7.* without CU-330 Version: 7.6.* without CU-330 Version: 7.5 CE 7.5.* without CU-330 Version: 7.4.* without CU-330 Version: 6.1.* without CU-330 Version: 7.5.* without CU-330 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.652Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0026" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "affected", "version": "7.7.* without CU-330" }, { "status": "unaffected", "version": "7.7.* with CU-330" }, { "status": "affected", "version": "7.6.* without CU-330" }, { "status": "unaffected", "version": "7.6.* with CU-330" }, { "status": "affected", "version": "7.5 CE 7.5.* without CU-330" }, { "status": "unaffected", "version": "7.5 CE 7.5.* with CU-330" }, { "status": "affected", "version": "7.4.* without CU-330" }, { "status": "unaffected", "version": "7.4.* with CU-330" }, { "status": "affected", "version": "6.1.* without CU-330" }, { "status": "unaffected", "version": "6.1.* with CU-330" }, { "status": "affected", "version": "7.5.* without CU-330" }, { "status": "unaffected", "version": "7.5.* with CU-330" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Xavier DANEST of Decathlon and Yasser Alhazmi for discovering and reporting this issue." } ], "datePublic": "2022-05-11T00:00:00", "descriptions": [ { "lang": "en", "value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-282", "description": "CWE-282 Improper Ownership Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:30:25", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0026" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in all Cortex XDR agent versions with content update 330 and later content update versions." } ], "source": { "defect": [ "CPATR-13696", "CPATR-13873" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-05-11T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Unintended Program Execution Leads to Local Privilege Escalation (PE) Vulnerability", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-05-11T16:00:00.000Z", "ID": "CVE-2022-0026", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Unintended Program Execution Leads to Local Privilege Escalation (PE) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "=", "version_name": "7.7", "version_value": "7.7.* without CU-330" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.7", "version_value": "7.7.* with CU-330" }, { "platform": "Windows", "version_affected": "=", "version_name": "7.6", "version_value": "7.6.* without CU-330" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.6", "version_value": "7.6.* with CU-330" }, { "platform": "Windows", "version_affected": "=", "version_name": "7.5 CE", "version_value": "7.5.* without CU-330" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.5 CE", "version_value": "7.5.* with CU-330" }, { "platform": "Windows", "version_affected": "=", "version_name": "7.4", "version_value": "7.4.* without CU-330" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.4", "version_value": "7.4.* with CU-330" }, { "platform": "Windows", "version_affected": "=", "version_name": "6.1", "version_value": "6.1.* without CU-330" }, { "platform": "Windows", "version_affected": "!", "version_name": "6.1", "version_value": "6.1.* with CU-330" }, { "platform": "Windows", "version_affected": "=", "version_name": "7.5", "version_value": "7.5.* without CU-330" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.5", "version_value": "7.5.* with CU-330" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Xavier DANEST of Decathlon and Yasser Alhazmi for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-282 Improper Ownership Management" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0026", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0026" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in all Cortex XDR agent versions with content update 330 and later content update versions." } ], "source": { "defect": [ "CPATR-13696", "CPATR-13873" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-05-11T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 7.7", "Cortex XDR Agent 7.6", "Cortex XDR Agent 7.5", "Cortex XDR Agent 7.4", "Cortex XDR Agent 7.5 CE", "Cortex XDR Agent 6.1" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0026", "datePublished": "2022-05-11T16:30:25.746724Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-17T01:26:10.764Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0013
Vulnerability from cvelistv5
Published
2022-01-12 17:30
Modified
2024-09-16 17:58
Severity ?
EPSS score ?
Summary
A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0013 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.2 < 7.2.4 Version: 5.0 < 5.0.12 Version: 6.1 < 6.1.9 Version: 7.3 < 7.3.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.263Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0013" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.4.*" }, { "status": "unaffected", "version": "7.5.*" }, { "changes": [ { "at": "7.2.4", "status": "unaffected" } ], "lessThan": "7.2.4", "status": "affected", "version": "7.2", "versionType": "custom" }, { "changes": [ { "at": "5.0.12", "status": "unaffected" } ], "lessThan": "5.0.12", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.9", "status": "unaffected" } ], "lessThan": "6.1.9", "status": "affected", "version": "6.1", "versionType": "custom" }, { "changes": [ { "at": "7.3.2", "status": "unaffected" } ], "lessThan": "7.3.2", "status": "affected", "version": "7.3", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "This issue was found by Robert McCallum of Palo Alto Networks during an internal security review." } ], "datePublic": "2022-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-538", "description": "CWE-538 File and Directory Information Exposure", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-12T17:30:17", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0013" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13480" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: File Information Exposure Vulnerability When Generating Support File", "workarounds": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-0013", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: File Information Exposure Vulnerability When Generating Support File" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "7.2", "version_value": "7.2.4" }, { "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.12" }, { "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.9" }, { "version_affected": "\u003c", "version_name": "7.3", "version_value": "7.3.2" }, { "version_affected": "!\u003e=", "version_name": "7.2", "version_value": "7.2.4" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.12" }, { "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.9" }, { "version_affected": "!", "version_name": "7.4", "version_value": "7.4.*" }, { "version_affected": "!\u003e=", "version_name": "7.3", "version_value": "7.3.2" }, { "version_affected": "!", "version_name": "7.5", "version_value": "7.5.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "This issue was found by Robert McCallum of Palo Alto Networks during an internal security review." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-538 File and Directory Information Exposure" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0013", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0013" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13480" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There are no known workarounds for this issue." } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 7.3", "Cortex XDR Agent 7.2", "Cortex XDR Agent 6.1", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0013", "datePublished": "2022-01-12T17:30:17.158913Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-16T17:58:02.852Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2024-9469
Vulnerability from cvelistv5
Published
2024-10-09 17:05
Modified
2024-10-18 11:55
Severity ?
EPSS score ?
Summary
A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2024-9469 | vendor-advisory |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.9 < 7.9.102-CE Version: 8.3 < 8.3.1 Version: 8.4 < 8.4.1 cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.4.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.3.0:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9-CE:-:*:*:*:*:*:* cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9.101-CE:-:*:*:*:*:*:* |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-9469", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-10-10T17:38:18.728169Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-10-10T17:38:44.959Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "cpes": [ "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.4.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:8.3.0:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9-CE:-:*:*:*:*:*:*", "cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.9.101-CE:-:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "7.9.102-CE", "status": "unaffected" } ], "lessThan": "7.9.102-CE", "status": "affected", "version": "7.9", "versionType": "custom" }, { "changes": [ { "at": "8.3.1", "status": "unaffected" } ], "lessThan": "8.3.1", "status": "affected", "version": "8.3", "versionType": "custom" }, { "status": "unaffected", "version": "8.3-CE" }, { "changes": [ { "at": "8.4.1", "status": "unaffected" } ], "lessThan": "8.4.1", "status": "affected", "version": "8.4", "versionType": "custom" }, { "status": "unaffected", "version": "8.5" }, { "status": "unaffected", "version": "8.6" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Orange Cyberdefense Switzerland\u0027s Research Team" } ], "datePublic": "2024-10-09T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." } ], "value": "A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-130", "descriptions": [ { "lang": "en", "value": "CAPEC-130 Excessive Allocation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "LOCAL", "baseScore": 5.7, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:P/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-754", "description": "CWE-754: Improper Check for Unusual or Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-10-18T11:55:36.651Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-9469" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "This issue is fixed in Cortex XDR Agent 7.9.102-CE, Cortex XDR Agent 8.3.1, Cortex XDR Agent 8.4.1, and all later Cortex XDR Agent versions." } ], "value": "This issue is fixed in Cortex XDR Agent 7.9.102-CE, Cortex XDR Agent 8.3.1, Cortex XDR Agent 8.4.1, and all later Cortex XDR Agent versions." } ], "source": { "defect": [ "CPATR-23347" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-10-09T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Windows User Can Disable the Agent", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-9469", "datePublished": "2024-10-09T17:05:55.091Z", "dateReserved": "2024-10-03T11:35:16.152Z", "dateUpdated": "2024-10-18T11:55:36.651Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-2049
Vulnerability from cvelistv5
Published
2020-12-09 18:00
Modified
2024-09-17 02:53
Severity ?
EPSS score ?
Summary
A local privilege escalation vulnerability exists in Palo Alto Networks Cortex XDR Agent on the Windows platform that allows an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory. This issue impacts: All versions of Cortex XDR Agent 7.1 with content update 149 and earlier versions; All versions of Cortex XDR Agent 7.2 with content update 149 and earlier versions.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2020-2049 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | Cortex XDR Agent |
Version: 7.1.* without content update 150 Version: 7.2.* without content update 150 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T06:54:00.705Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2049" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.1.* with content update 150" }, { "status": "affected", "version": "7.1.* without content update 150" }, { "status": "unaffected", "version": "7.2.* with content update 150" }, { "status": "affected", "version": "7.2.* without content update 150" } ] }, { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "6.1.* with latest content" }, { "status": "unaffected", "version": "7.0.* with latest content" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Chris Au of PwC Hong Kong - Darklab and Xavier DANEST of Decathlon for discovering and reporting this issue." } ], "datePublic": "2020-12-09T00:00:00", "descriptions": [ { "lang": "en", "value": "A local privilege escalation vulnerability exists in Palo Alto Networks Cortex XDR Agent on the Windows platform that allows an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory. This issue impacts: All versions of Cortex XDR Agent 7.1 with content update 149 and earlier versions; All versions of Cortex XDR Agent 7.2 with content update 149 and earlier versions." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-427", "description": "CWE-427 Uncontrolled Search Path Element", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-09T18:00:14", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2020-2049" } ], "solutions": [ { "lang": "en", "value": "Cortex XDR Agent content update version 150 and all later content update versions resolve this issue for Cortex XDR Agent 7.1 and Cortex XDR Agent 7.2 versions.\n\nCortex XDR Agent 6.1 and Cortex XDR Agent 7.0 are not impacted with the latest content update.\n\nContent updates are automatically applied for the agent. A Cortex XDR Agent version upgrade is not required to resolve this issue." } ], "source": { "defect": [ "CPATR-11314", "CPATR-10346" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-12-09T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Improper control of loaded DLL leads to local privilege escalation", "workarounds": [ { "lang": "en", "value": "This issue is mitigated by preventing local authenticated Windows users from creating files in the Windows root directory such as C:\\." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2020-12-09T17:00:00.000Z", "ID": "CVE-2020-2049", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Improper control of loaded DLL leads to local privilege escalation" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "!", "version_name": "7.1", "version_value": "7.1.* with content update 150" }, { "platform": "Windows", "version_affected": "=", "version_name": "7.1", "version_value": "7.1.* without content update 150" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.2", "version_value": "7.2.* with content update 150" }, { "platform": "Windows", "version_affected": "=", "version_name": "7.2", "version_value": "7.2.* without content update 150" }, { "platform": "Windows", "version_affected": "!", "version_name": "6.1", "version_value": "6.1.* with latest content" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.0", "version_value": "7.0.* with latest content" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Chris Au of PwC Hong Kong - Darklab and Xavier DANEST of Decathlon for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local privilege escalation vulnerability exists in Palo Alto Networks Cortex XDR Agent on the Windows platform that allows an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory. This issue impacts: All versions of Cortex XDR Agent 7.1 with content update 149 and earlier versions; All versions of Cortex XDR Agent 7.2 with content update 149 and earlier versions." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-427 Uncontrolled Search Path Element" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2020-2049", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2020-2049" } ] }, "solution": [ { "lang": "en", "value": "Cortex XDR Agent content update version 150 and all later content update versions resolve this issue for Cortex XDR Agent 7.1 and Cortex XDR Agent 7.2 versions.\n\nCortex XDR Agent 6.1 and Cortex XDR Agent 7.0 are not impacted with the latest content update.\n\nContent updates are automatically applied for the agent. A Cortex XDR Agent version upgrade is not required to resolve this issue." } ], "source": { "defect": [ "CPATR-11314", "CPATR-10346" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2020-12-09T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "This issue is mitigated by preventing local authenticated Windows users from creating files in the Windows root directory such as C:\\." } ], "x_affectedList": [ "Cortex XDR Agent 7.2", "Cortex XDR Agent 7.1" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2020-2049", "datePublished": "2020-12-09T18:00:14.602237Z", "dateReserved": "2019-12-04T00:00:00", "dateUpdated": "2024-09-17T02:53:03.084Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0012
Vulnerability from cvelistv5
Published
2022-01-12 17:30
Modified
2024-09-17 01:55
Severity ?
EPSS score ?
Summary
An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0012 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 5.0 < 5.0.12 Version: 7.2 < 7.2.4 Version: 7.3 < 7.3.2 Version: 6.1 < 6.1.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.522Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0012" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.4.*" }, { "status": "unaffected", "version": "7.5.*" }, { "status": "unaffected", "version": "7.6.*" }, { "changes": [ { "at": "5.0.12", "status": "unaffected" } ], "lessThan": "5.0.12", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "7.2.4", "status": "unaffected" } ], "lessThan": "7.2.4", "status": "affected", "version": "7.2", "versionType": "custom" }, { "changes": [ { "at": "7.3.2", "status": "unaffected" } ], "lessThan": "7.3.2", "status": "affected", "version": "7.3", "versionType": "custom" }, { "changes": [ { "at": "6.1.9", "status": "unaffected" } ], "lessThan": "6.1.9", "status": "affected", "version": "6.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Chris Au for discovering and reporting this issue." } ], "datePublic": "2022-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-12T17:30:15", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0012" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13408" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Arbitrary File Deletion Vulnerability", "workarounds": [ { "lang": "en", "value": "There is no known workaround available for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-0012", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Local Arbitrary File Deletion Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.12" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.12" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.2", "version_value": "7.2.4" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.2", "version_value": "7.2.4" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.3", "version_value": "7.3.2" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.3", "version_value": "7.3.2" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.4", "version_value": "7.4.*" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.9" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.9" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.5", "version_value": "7.5.*" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.6", "version_value": "7.6.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Chris Au for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0012", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0012" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13408" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There is no known workaround available for this issue." } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 7.3", "Cortex XDR Agent 7.2", "Cortex XDR Agent 7.1", "Cortex XDR Agent 7.0", "Cortex XDR Agent 6.1", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0012", "datePublished": "2022-01-12T17:30:15.528091Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-17T01:55:48.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2022-0029
Vulnerability from cvelistv5
Published
2022-09-14 16:35
Modified
2024-09-17 02:41
Severity ?
EPSS score ?
Summary
An improper link resolution vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local attacker to read files on the system with elevated privileges when generating a tech support file.
References
▼ | URL | Tags |
---|---|---|
https://security.paloaltonetworks.com/CVE-2022-0029 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
▼ | Palo Alto Networks | Cortex XDR Agent |
Version: 7.7 < 7.7.3 Version: 7.5 CE < 7.5.101-CE Version: 5.0 < 5.0.12-hotfix update |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.370Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "lessThan": "7.7.3", "status": "affected", "version": "7.7", "versionType": "custom" }, { "lessThan": "7.5.101-CE", "status": "affected", "version": "7.5 CE", "versionType": "custom" }, { "lessThan": "5.0.12-hotfix update", "status": "affected", "version": "5.0", "versionType": "custom" } ] }, { "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.8 all" }, { "lessThan": "7.7*", "status": "unaffected", "version": "7.7.3", "versionType": "custom" }, { "lessThan": "7.5 CE*", "status": "unaffected", "version": "7.5.101-CE", "versionType": "custom" }, { "lessThan": "5.0*", "status": "unaffected", "version": "5.0.12-hotfix update", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Diego Garc\u00eda of INCIDE for discovering and reporting this issue." } ], "datePublic": "2022-09-14T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper link resolution vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local attacker to read files on the system with elevated privileges when generating a tech support file." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue. However, details of this vulnerability are expected to become publicly available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-09-14T16:35:08", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0029" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12-hotfix update, Cortex XDR agent 7.5.101-CE, Cortex XDR agent 7.7.3, and all later versions of the Cortex XDR agent." } ], "source": { "defect": [ "CPATR-16806" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-09-14T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Improper Link Resolution Vulnerability When Generating a Tech Support File", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-09-14T16:00:00.000Z", "ID": "CVE-2022-0029", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Improper Link Resolution Vulnerability When Generating a Tech Support File" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.7", "version_value": "7.7.3" }, { "version_affected": "!\u003e=", "version_name": "7.7", "version_value": "7.7.3" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.5 CE", "version_value": "7.5.101-CE" }, { "version_affected": "!\u003e=", "version_name": "7.5 CE", "version_value": "7.5.101-CE" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.12-hotfix update" }, { "version_affected": "!", "version_name": "7.8", "version_value": "all" }, { "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.12-hotfix update" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Diego Garc\u00eda of INCIDE for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper link resolution vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local attacker to read files on the system with elevated privileges when generating a tech support file." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue. However, details of this vulnerability are expected to become publicly available." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "NONE", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0029", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0029" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12-hotfix update, Cortex XDR agent 7.5.101-CE, Cortex XDR agent 7.7.3, and all later versions of the Cortex XDR agent." } ], "source": { "defect": [ "CPATR-16806" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-09-14T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 7.7", "Cortex XDR Agent 7.5 CE", "Cortex XDR Agent 5.0", "Cortex XDR Agent" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0029", "datePublished": "2022-09-14T16:35:08.910462Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-17T02:41:54.889Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2023-3280
Vulnerability from cvelistv5
Published
2023-09-13 16:13
Modified
2024-09-25 17:48
Severity ?
EPSS score ?
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to disable the agent.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 5.0 Version: 7.5-CE Version: 7.9 < 7.9.3 Version: 7.9-CE < 7.9.101-CE Version: 8.0 < 8.0.2 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T06:48:08.400Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2023-3280" } ], "title": "CVE Program Container" }, { "metrics": [ { "other": { "content": { "id": "CVE-2023-3280", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-09-25T17:41:53.331366Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-09-25T17:48:34.264Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "affected", "version": "5.0" }, { "status": "affected", "version": "7.5-CE" }, { "changes": [ { "at": "7.9.3", "status": "unaffected" } ], "lessThan": "7.9.3", "status": "affected", "version": "7.9", "versionType": "custom" }, { "changes": [ { "at": "7.9.101-CE", "status": "unaffected" } ], "lessThan": "7.9.101-CE", "status": "affected", "version": "7.9-CE", "versionType": "custom" }, { "changes": [ { "at": "8.0.2", "status": "unaffected" } ], "lessThan": "8.0.2", "status": "affected", "version": "8.0", "versionType": "custom" }, { "status": "unaffected", "version": "8.1" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Manuel Feifel of InfoGuard AG" } ], "datePublic": "2023-09-13T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to disable the agent.\u003c/p\u003e" } ], "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local user to disable the agent.\n\n" } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue.\n\n" } ], "impacts": [ { "capecId": "CAPEC-578", "descriptions": [ { "lang": "en", "value": "CAPEC-578 Disable Security Software" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 5.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-755", "description": "CWE-755 Improper Handling of Exceptional Conditions", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2023-09-13T16:13:29.266Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "url": "https://security.paloaltonetworks.com/CVE-2023-3280" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eThis issue is fixed in Cortex XDR agent 7.9.101-CE, Cortex XDR agent 7.9.3, Cortex XDR agent 8.0.2, and all later Cortex XDR agent versions.\u003c/span\u003e\u003cbr\u003e" } ], "value": "This issue is fixed in Cortex XDR agent 7.9.101-CE, Cortex XDR agent 7.9.3, Cortex XDR agent 8.0.2, and all later Cortex XDR agent versions.\n" } ], "source": { "defect": [ "CPATR-19884" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2023-09-13T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Windows User Can Disable the Agent", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2023-3280", "datePublished": "2023-09-13T16:13:29.266Z", "dateReserved": "2023-06-15T23:55:42.807Z", "dateUpdated": "2024-09-25T17:48:34.264Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }