CVE-2022-0031 Cortex XSOAR: Local Privilege Escalation (PE) Vulnerability in Cortex XSOAR Engine
Description
A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system allows a local attacker with shell access to the engine to execute programs with elevated privileges.
Product Status
Versions | Affected | Unaffected |
---|---|---|
Cortex XSOAR 6.9 | < 6.9.0.130766 on Linux, <= 6.9.0.3387847 on Linux | >= 6.9.0.130766 on Linux |
Cortex XSOAR 6.8 | All | |
Cortex XSOAR 6.6 | All | |
Cortex XSOAR 6.5 | All |
Required Configuration for Exposure
This issue is applicable only to Cortex XSOAR engine software running on a Linux operating system that was installed through the shell method.
Please see the following link for more Cortex XSOAR engine installation information:
Severity: MEDIUM
CVSSv3.1 Base Score: 6.7 (CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H)
Exploitation Status
Palo Alto Networks is not aware of any malicious exploitation of this issue.
Weakness Type
CWE-345 Insufficient Verification of Data Authenticity
Solution
This issue is fixed in Cortex XSOAR engine software available in Cortex XSOAR 6.9.0 build 130766 and all later versions of Cortex XSOAR.
NOTE: The build numbers for Cortex XSOAR software releases have changed format. Please consider the new format when evaluating version applicability. Cortex XSOAR release documentation is available at the following link: https://docs.paloaltonetworks.com/cortex/cortex-xsoar.
Workarounds and Mitigations
There are no known workarounds for this issue.