Palo Alto Networks Security Advisories / CVE-2022-0014

CVE-2022-0014 Cortex XDR Agent: Unintended Program Execution When Using Live Terminal Session


047910
Severity 6.7 · MEDIUM
Attack Vector LOCAL
Scope UNCHANGED
Attack Complexity HIGH
Confidentiality Impact HIGH
Privileges Required LOW
Integrity Impact HIGH
User Interaction REQUIRED
Availability Impact HIGH

Description

An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session.

This issue impacts:

Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12 on Windows;

Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9 on Windows;

Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4 on Windows;

Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2 on Windows.

Product Status

VersionsAffectedUnaffected
Cortex XDR Agent 7.6None7.6.*
Cortex XDR Agent 7.5None7.5.*
Cortex XDR Agent 7.4None7.4.*
Cortex XDR Agent 7.3< 7.3.2 on Windows>= 7.3.2 on Windows
Cortex XDR Agent 7.2< 7.2.4 on Windows>= 7.2.4 on Windows
Cortex XDR Agent 6.1< 6.1.9 on Windows>= 6.1.9 on Windows
Cortex XDR Agent 5.0< 5.0.12 on Windows>= 5.0.12 on Windows

Severity: MEDIUM

CVSSv3.1 Base Score: 6.7 (CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H)

Exploitation Status

Palo Alto Networks is not aware of any malicious exploitation of this issue.

Weakness Type

CWE-426 Untrusted Search Path

Solution

This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions.

Workarounds and Mitigations

There are no known workarounds for this issue.

Acknowledgments

This issue was found by Robert McCallum of Palo Alto Networks during an internal security review.

Timeline

Update to affected platforms
Initial publication
© 2024 Palo Alto Networks, Inc. All rights reserved.