PAN-SA-2020-0010 Informational: Cortex XSOAR: Impact of Linux and Docker vulnerabilities on Cortex XSOAR
Informational
Description
Cortex XSOAR provides analysts with the option to specify the Docker image to use for running custom scripts and integrations. An analyst who has write permission to scripts or integrations is able to exploit Docker vulnerabilities such as CVE-2019-5736, or Linux kernel vulnerability such as CVE-2020-14386 to obtain root access on the Cortex XSOAR server.
Demisto Server does not use the docker exec command and does not expose a mechanism for an external attacker to manipulate or provide an attacker-controlled image for execution. Thus, CVE-2019-5736 does not increase exposure to an external attack.
CVE-2019-5021 is a vulnerability in Alpine Linux Docker images where the root password may be NULL. Cortex XSOAR has conducted a scan of all Docker images it maintains in its Docker Hub repository. Following the scan, we concluded that none of the Alpine-based images are affected by CVE-2019-5021 because they do not include either the shadow or linux-pam packages.
No Cortex XSOAR Docker images are impacted by CVE-2019-5021.
CVE | Summary |
---|---|
CVE-2020-14386 | Conditions required for exploiting this vulnerability do not exist in Cortex XSOAR software when using Linux kernel version 5.9-rc4 and later or Linux kernel version 4.6 and older. |
CVE-2019-5736 | Conditions required for exploiting this vulnerability do not exist in Cortex XSOAR software when using Docker version 18.09.2 and later. |
CVE-2019-5021 | This is a vulnerability in Alpine Linux Docker images where root password may be NULL. All Alpine Linux based Docker images for Cortex XSOAR do not include either the shadow or linux-pam packages required for this vulnerability. Hence Cortex XSOAR software is not impacted. |
Product Status
Versions | Affected | Unaffected |
---|---|---|
Cortex XSOAR all | None | All |
Weakness Type
CWE-216 Containment Errors (Container Errors)
Solution
No Palo Alto Networks Cortex XSOAR product updates are required.
Upgrade Docker to the latest version (18.09.2 or later) as provided by your Linux vendor.
Upgrading affected Linux kernels to the latest available patch provided by your Linux vendor.
Workarounds and Mitigations
Mitigate CVE-2020-14386 by not running Docker containers as a root user. A non-root user within a container does not have access to raw packets (CAP_NET_RAW capability). Follow the Cortex XSOAR Hardening Guide to configure a non-root internal user for docker: https://docs.paloaltonetworks.com/cortex/cortex-xsoar/5-5/cortex-xsoar-admin/docker/docker-hardening-guide.html .
Mitigate CVE-2019-5736 by disabling write access to scripts and integrations to untrusted analysts.