Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2022-0013: CVE-2022-0013 Cortex XDR Agent: File Information Exposure Vulnerability When Generating Support File

A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.

CVE
#vulnerability#js
  • Get support
  • Security advisories
  • Report vulnerabilities
  • Subscribe
  • RSS feed

Palo Alto Networks Security Advisories / CVE-2022-0013

Attack Vector LOCAL

Attack Complexity LOW

Privileges Required LOW

User Interaction REQUIRED

Scope UNCHANGED

Confidentiality Impact HIGH

Integrity Impact NONE

Availability Impact NONE

NVD JSON

Published 2022-01-12

Updated 2022-01-12

Reference CPATR-13480

Discovered internally

Description

A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file.

This issue impacts:

Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12;

Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9;

Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4;

Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.

Product Status

Versions

Affected

Unaffected

Cortex XDR Agent 7.5

None

7.5.*

Cortex XDR Agent 7.4

None

7.4.*

Cortex XDR Agent 7.3

< 7.3.2

>= 7.3.2

Cortex XDR Agent 7.2

< 7.2.4

>= 7.2.4

Cortex XDR Agent 6.1

< 6.1.9

>= 6.1.9

Cortex XDR Agent 5.0

< 5.0.12

>= 5.0.12

Severity: MEDIUM

CVSSv3.1 Base Score: 5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-538 File and Directory Information Exposure

Solution

This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions.

Workarounds and Mitigations

There are no known workarounds for this issue.

Acknowledgments

This issue was found by Robert McCallum of Palo Alto Networks during an internal security review.

Timeline

2022-01-12 Initial publication

© 2020 Palo Alto Networks, Inc. All rights reserved.

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda