Headline
CVE-2022-0015: CVE-2022-0015 Cortex XDR Agent: An Uncontrolled Search Path Element Leads to Local Privilege Escalation (PE) Vulnerability
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9.
- Get support
- Security advisories
- Report vulnerabilities
- Subscribe
- RSS feed
Palo Alto Networks Security Advisories / CVE-2022-0015
Attack Vector LOCAL
Attack Complexity LOW
Privileges Required LOW
User Interaction NONE
Scope UNCHANGED
Confidentiality Impact HIGH
Integrity Impact HIGH
Availability Impact HIGH
NVD JSON
Published 2022-01-12
Updated 2022-01-12
Reference CPATR-13405 and CPATR-9287
Discovered externally
Description
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges.
This issue impacts:
Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12;
Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9.
Product Status
Versions
Affected
Unaffected
Cortex XDR Agent 7.6
None
7.6.*
Cortex XDR Agent 7.5
None
7.5.*
Cortex XDR Agent 7.4
None
7.4.*
Cortex XDR Agent 7.3
None
7.3.*
Cortex XDR Agent 7.2
None
7.2.*
Cortex XDR Agent 6.1
< 6.1.9
>= 6.1.9
Cortex XDR Agent 5.0
< 5.0.12
>= 5.0.12
Severity: HIGH
CVSSv3.1 Base Score: 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-427 Uncontrolled Search Path Element
Solution
This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, and all later Cortex XDR agent versions.
Workarounds and Mitigations
There are no known workarounds for this issue.
Acknowledgments
Palo Alto Networks thanks Xavier DANEST of Decathlon for discovering and reporting this issue.
Timeline
2022-01-12 Initial publication
© 2020 Palo Alto Networks, Inc. All rights reserved.