CVE-2022-0026 (GCVE-0-2022-0026)
Vulnerability from cvelistv5 – Published: 2022-05-11 16:30 – Updated: 2024-09-17 01:26
VLAI?
Title
Cortex XDR Agent: Unintended Program Execution Leads to Local Privilege Escalation (PE) Vulnerability
Summary
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.
Severity ?
6.7 (Medium)
CWE
- CWE-282 - Improper Ownership Management
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| Palo Alto Networks | Cortex XDR Agent |
Affected:
7.7.* without CU-330
Unaffected: 7.7.* with CU-330 Affected: 7.6.* without CU-330 Unaffected: 7.6.* with CU-330 Affected: 7.5 CE 7.5.* without CU-330 Unaffected: 7.5 CE 7.5.* with CU-330 Affected: 7.4.* without CU-330 Unaffected: 7.4.* with CU-330 Affected: 6.1.* without CU-330 Unaffected: 6.1.* with CU-330 Affected: 7.5.* without CU-330 Unaffected: 7.5.* with CU-330 |
Credits
Palo Alto Networks thanks Xavier DANEST of Decathlon and Yasser Alhazmi for discovering and reporting this issue.
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-02T23:18:41.652Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://security.paloaltonetworks.com/CVE-2022-0026"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"platforms": [
"Windows"
],
"product": "Cortex XDR Agent",
"vendor": "Palo Alto Networks",
"versions": [
{
"status": "affected",
"version": "7.7.* without CU-330"
},
{
"status": "unaffected",
"version": "7.7.* with CU-330"
},
{
"status": "affected",
"version": "7.6.* without CU-330"
},
{
"status": "unaffected",
"version": "7.6.* with CU-330"
},
{
"status": "affected",
"version": "7.5 CE 7.5.* without CU-330"
},
{
"status": "unaffected",
"version": "7.5 CE 7.5.* with CU-330"
},
{
"status": "affected",
"version": "7.4.* without CU-330"
},
{
"status": "unaffected",
"version": "7.4.* with CU-330"
},
{
"status": "affected",
"version": "6.1.* without CU-330"
},
{
"status": "unaffected",
"version": "6.1.* with CU-330"
},
{
"status": "affected",
"version": "7.5.* without CU-330"
},
{
"status": "unaffected",
"version": "7.5.* with CU-330"
}
]
}
],
"credits": [
{
"lang": "en",
"value": "Palo Alto Networks thanks Xavier DANEST of Decathlon and Yasser Alhazmi for discovering and reporting this issue."
}
],
"datePublic": "2022-05-11T00:00:00.000Z",
"descriptions": [
{
"lang": "en",
"value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version."
}
],
"exploits": [
{
"lang": "en",
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-282",
"description": "CWE-282 Improper Ownership Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-05-11T16:30:25.000Z",
"orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"shortName": "palo_alto"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://security.paloaltonetworks.com/CVE-2022-0026"
}
],
"solutions": [
{
"lang": "en",
"value": "This issue is fixed in all Cortex XDR agent versions with content update 330 and later content update versions."
}
],
"source": {
"defect": [
"CPATR-13696",
"CPATR-13873"
],
"discovery": "EXTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2022-05-11T00:00:00.000Z",
"value": "Initial publication"
}
],
"title": "Cortex XDR Agent: Unintended Program Execution Leads to Local Privilege Escalation (PE) Vulnerability",
"workarounds": [
{
"lang": "en",
"value": "There are no known workarounds for this issue."
}
],
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@paloaltonetworks.com",
"DATE_PUBLIC": "2022-05-11T16:00:00.000Z",
"ID": "CVE-2022-0026",
"STATE": "PUBLIC",
"TITLE": "Cortex XDR Agent: Unintended Program Execution Leads to Local Privilege Escalation (PE) Vulnerability"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "Cortex XDR Agent",
"version": {
"version_data": [
{
"platform": "Windows",
"version_affected": "=",
"version_name": "7.7",
"version_value": "7.7.* without CU-330"
},
{
"platform": "Windows",
"version_affected": "!",
"version_name": "7.7",
"version_value": "7.7.* with CU-330"
},
{
"platform": "Windows",
"version_affected": "=",
"version_name": "7.6",
"version_value": "7.6.* without CU-330"
},
{
"platform": "Windows",
"version_affected": "!",
"version_name": "7.6",
"version_value": "7.6.* with CU-330"
},
{
"platform": "Windows",
"version_affected": "=",
"version_name": "7.5 CE",
"version_value": "7.5.* without CU-330"
},
{
"platform": "Windows",
"version_affected": "!",
"version_name": "7.5 CE",
"version_value": "7.5.* with CU-330"
},
{
"platform": "Windows",
"version_affected": "=",
"version_name": "7.4",
"version_value": "7.4.* without CU-330"
},
{
"platform": "Windows",
"version_affected": "!",
"version_name": "7.4",
"version_value": "7.4.* with CU-330"
},
{
"platform": "Windows",
"version_affected": "=",
"version_name": "6.1",
"version_value": "6.1.* without CU-330"
},
{
"platform": "Windows",
"version_affected": "!",
"version_name": "6.1",
"version_value": "6.1.* with CU-330"
},
{
"platform": "Windows",
"version_affected": "=",
"version_name": "7.5",
"version_value": "7.5.* without CU-330"
},
{
"platform": "Windows",
"version_affected": "!",
"version_name": "7.5",
"version_value": "7.5.* with CU-330"
}
]
}
}
]
},
"vendor_name": "Palo Alto Networks"
}
]
}
},
"credit": [
{
"lang": "eng",
"value": "Palo Alto Networks thanks Xavier DANEST of Decathlon and Yasser Alhazmi for discovering and reporting this issue."
}
],
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version."
}
]
},
"exploit": [
{
"lang": "en",
"value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
}
],
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-282 Improper Ownership Management"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://security.paloaltonetworks.com/CVE-2022-0026",
"refsource": "MISC",
"url": "https://security.paloaltonetworks.com/CVE-2022-0026"
}
]
},
"solution": [
{
"lang": "en",
"value": "This issue is fixed in all Cortex XDR agent versions with content update 330 and later content update versions."
}
],
"source": {
"defect": [
"CPATR-13696",
"CPATR-13873"
],
"discovery": "EXTERNAL"
},
"timeline": [
{
"lang": "en",
"time": "2022-05-11T00:00:00.000Z",
"value": "Initial publication"
}
],
"work_around": [
{
"lang": "en",
"value": "There are no known workarounds for this issue."
}
],
"x_advisoryEoL": false,
"x_affectedList": [
"Cortex XDR Agent 7.7",
"Cortex XDR Agent 7.6",
"Cortex XDR Agent 7.5",
"Cortex XDR Agent 7.4",
"Cortex XDR Agent 7.5 CE",
"Cortex XDR Agent 6.1"
]
}
}
},
"cveMetadata": {
"assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
"assignerShortName": "palo_alto",
"cveId": "CVE-2022-0026",
"datePublished": "2022-05-11T16:30:25.746Z",
"dateReserved": "2021-12-28T00:00:00.000Z",
"dateUpdated": "2024-09-17T01:26:10.764Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…