CVE-2022-0014 Cortex XDR Agent: Unintended Program Execution When Using Live Terminal Session
Description
An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session.
This issue impacts:
Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12 on Windows;
Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9 on Windows;
Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4 on Windows;
Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2 on Windows.
Product Status
Versions | Affected | Unaffected |
---|---|---|
Cortex XDR Agent 7.6 | None | 7.6.* |
Cortex XDR Agent 7.5 | None | 7.5.* |
Cortex XDR Agent 7.4 | None | 7.4.* |
Cortex XDR Agent 7.3 | < 7.3.2 on Windows | >= 7.3.2 on Windows |
Cortex XDR Agent 7.2 | < 7.2.4 on Windows | >= 7.2.4 on Windows |
Cortex XDR Agent 6.1 | < 6.1.9 on Windows | >= 6.1.9 on Windows |
Cortex XDR Agent 5.0 | < 5.0.12 on Windows | >= 5.0.12 on Windows |
Severity: MEDIUM
CVSSv3.1 Base Score: 6.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
Solution
This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions.
Workarounds and Mitigations
There are no known workarounds for this issue.