A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file.
This issue impacts:
Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12 on Windows;
Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9 on Windows;
Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4 on Windows;
Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2 on Windows.
|Cortex XDR Agent 7.5||None||7.5.*|
|Cortex XDR Agent 7.4||None||7.4.*|
|Cortex XDR Agent 7.3||< 7.3.2 on Windows||>= 7.3.2 on Windows|
|Cortex XDR Agent 7.2||< 7.2.4 on Windows||>= 7.2.4 on Windows|
|Cortex XDR Agent 6.1||< 6.1.9 on Windows||>= 6.1.9 on Windows|
|Cortex XDR Agent 5.0||< 5.0.12 on Windows||>= 5.0.12 on Windows|
CVSSv3.1 Base Score: 5 (CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N)
Palo Alto Networks is not aware of any malicious exploitation of this issue.
This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions.
There are no known workarounds for this issue.