CVE-2022-0015 Cortex XDR Agent: An Uncontrolled Search Path Element Leads to Local Privilege Escalation (PE) Vulnerability
Attack Vector
LOCAL
Scope
UNCHANGED
Attack Complexity
LOW
Confidentiality Impact
HIGH
Privileges Required
LOW
Integrity Impact
HIGH
User Interaction
NONE
Availability Impact
HIGH
Description
A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables an authenticated local user to execute programs with elevated privileges.
This issue impacts:
Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12;
Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9.
Product Status
Versions | Affected | Unaffected |
---|---|---|
Cortex XDR Agent 7.6 | None | 7.6.* |
Cortex XDR Agent 7.5 | None | 7.5.* |
Cortex XDR Agent 7.4 | None | 7.4.* |
Cortex XDR Agent 7.3 | None | 7.3.* |
Cortex XDR Agent 7.2 | None | 7.2.* |
Cortex XDR Agent 6.1 | < 6.1.9 | >= 6.1.9 |
Cortex XDR Agent 5.0 | < 5.0.12 | >= 5.0.12 |
Severity: HIGH
CVSSv3.1 Base Score: 7.8 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-427 Uncontrolled Search Path Element
Solution
This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, and all later Cortex XDR agent versions.
Workarounds and Mitigations
There are no known workarounds for this issue.
Acknowledgments
Palo Alto Networks thanks Xavier DANEST of Decathlon for discovering and reporting this issue.
Timeline
Initial publication