Palo Alto Networks Security Advisories / CVE-2021-26701

CVE-2021-26701 Informational: Impact of Microsoft PowerShell Vulnerability CVE-2021-26701 on Cortex XSOAR

047910
Severity 0 · NONE
Attack Vector PHYSICAL
Attack Complexity HIGH
Privileges Required HIGH
User Interaction REQUIRED
Scope UNCHANGED
Confidentiality Impact NONE
Integrity Impact NONE
Availability Impact NONE

Description

Palo Alto Networks Cortex XSOAR maintains Docker Images with PowerShell available for customers to use. The base docker images with PowerShell were updated on May 19, 2021 with PowerShell version 7.1.3. Palo Alto Networks urges customers to upgrade their docker images to a version with the tag 7.1.3 or higher to protect against the PowerShell vulnerability CVE-2021-26701.

All content on the Cortex XSOAR Marketplace that utilizes PowerShell has been updated to use PowerShell version 7.1.3 to mitigate any possible risk associated with CVE-2021-26701. Customers are encouraged to also update all relevant content on the Cortex XSOAR Marketplace.

Product Status

VersionsAffectedUnaffected
Cortex XSOAR PowerShell Image 7.1< 7.1.3.20270>= 7.1.3.20270

Required Configuration for Exposure

Severity: NONE

CVSSv3.1 Base Score: 0 (CVSS:3.1/AV:P/AC:H/PR:H/UI:R/S:U/C:N/I:N/A:N)

Exploitation Status

Weakness Type

Solution

This issue is fixed in Cortex XSOAR Base PowerShell image 7.1.3.20270 and later Cortex XSOAR Base PowerShell image versions.

Workarounds and Mitigations

Timeline

Initial publication
© 2020 Palo Alto Networks, Inc. All rights reserved.