Lucene search

K
cve[email protected]CVE-2022-0013
HistoryJan 12, 2022 - 6:15 p.m.

CVE-2022-0013

2022-01-1218:15:08
CWE-538
CWE-200
web.nvd.nist.gov
30
1
cve-2022-0013
information security
palo alto networks
cortex xdr
vulnerability
file exposure
local attack
privilege escalation

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.

Affected configurations

NVD
Node
paloaltonetworkscortex_xdr_agentRange5.0–5.0.12
OR
paloaltonetworkscortex_xdr_agentRange6.1–6.1.9
OR
paloaltonetworkscortex_xdr_agentRange7.2–7.2.4
OR
paloaltonetworkscortex_xdr_agentRange7.3–7.3.2
AND
microsoftwindowsMatch-

CNA Affected

[
  {
    "product": "Cortex XDR Agent",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "unaffected",
        "version": "7.4.*"
      },
      {
        "status": "unaffected",
        "version": "7.5.*"
      },
      {
        "changes": [
          {
            "at": "7.2.4",
            "status": "unaffected"
          }
        ],
        "lessThan": "7.2.4",
        "status": "affected",
        "version": "7.2",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "5.0.12",
            "status": "unaffected"
          }
        ],
        "lessThan": "5.0.12",
        "status": "affected",
        "version": "5.0",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "6.1.9",
            "status": "unaffected"
          }
        ],
        "lessThan": "6.1.9",
        "status": "affected",
        "version": "6.1",
        "versionType": "custom"
      },
      {
        "changes": [
          {
            "at": "7.3.2",
            "status": "unaffected"
          }
        ],
        "lessThan": "7.3.2",
        "status": "affected",
        "version": "7.3",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

5.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

5.1 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2022-0013