Palo Alto Networks Security Advisories / CVE-2021-26701

CVE-2021-26701 Informational: Impact of Microsoft PowerShell Vulnerability CVE-2021-26701 on Cortex XSOAR

Severity 0 · NONE
Attack Vector Not applicable
Scope Not applicable
Attack Complexity Not applicable
Confidentiality Impact NONE
Privileges Required Not applicable
Integrity Impact NONE
User Interaction Not applicable
Availability Impact NONE


Palo Alto Networks Cortex XSOAR maintains Docker Images with PowerShell available for customers to use. The base docker images with PowerShell were updated on May 19, 2021 with PowerShell version 7.1.3. Palo Alto Networks urges customers to upgrade their docker images to a version with the tag 7.1.3 or higher to protect against the PowerShell vulnerability CVE-2021-26701.

All content on the Cortex XSOAR Marketplace that utilizes PowerShell has been updated to use PowerShell version 7.1.3 to mitigate any possible risk associated with CVE-2021-26701. Customers are encouraged to also update all relevant content on the Cortex XSOAR Marketplace.

CVE-2021-267019.8 (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H).NET Core Remote Code Execution (RCE) Vulnerability

Product Status

Cortex XSOAR PowerShell Image 7.1<>=

Required Configuration for Exposure

Severity: NONE

CVSSv3.1 Base Score: 0 (CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N)

Exploitation Status


This issue is fixed in Cortex XSOAR Base PowerShell image and later Cortex XSOAR Base PowerShell image versions.

Workarounds and Mitigations


Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.