Lucene search

K
cve[email protected]CVE-2022-0026
HistoryMay 11, 2022 - 5:15 p.m.

CVE-2022-0026

2022-05-1117:15:09
CWE-282
web.nvd.nist.gov
65
6
cve-2022-0026
palo alto networks
cortex xdr
windows
vulnerability
local privilege escalation
nvd

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.

Affected configurations

NVD
Node
microsoftwindowsMatch-
AND
paloaltonetworkscortex_xdr_agentMatch6.1-
OR
paloaltonetworkscortex_xdr_agentMatch6.1content_update330
OR
paloaltonetworkscortex_xdr_agentMatch6.1.4content_update330
OR
paloaltonetworkscortex_xdr_agentMatch6.1.4hotfix
OR
paloaltonetworkscortex_xdr_agentMatch6.1.5-
OR
paloaltonetworkscortex_xdr_agentMatch6.1.5content_update330
OR
paloaltonetworkscortex_xdr_agentMatch6.1.5hotfix
OR
paloaltonetworkscortex_xdr_agentMatch6.1.6-
OR
paloaltonetworkscortex_xdr_agentMatch6.1.6content_update330
OR
paloaltonetworkscortex_xdr_agentMatch6.1.7-
OR
paloaltonetworkscortex_xdr_agentMatch6.1.7content_update330
OR
paloaltonetworkscortex_xdr_agentMatch6.1.8-
OR
paloaltonetworkscortex_xdr_agentMatch6.1.8content_update330
OR
paloaltonetworkscortex_xdr_agentMatch6.1.9-
OR
paloaltonetworkscortex_xdr_agentMatch6.1.9content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.4.1-
OR
paloaltonetworkscortex_xdr_agentMatch7.4.1content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.4.2-
OR
paloaltonetworkscortex_xdr_agentMatch7.4.2content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.4.3-
OR
paloaltonetworkscortex_xdr_agentMatch7.4.3content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.4.4-
OR
paloaltonetworkscortex_xdr_agentMatch7.4.4content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.5-content_engine
OR
paloaltonetworkscortex_xdr_agentMatch7.5.1-
OR
paloaltonetworkscortex_xdr_agentMatch7.5.1content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.5.2-
OR
paloaltonetworkscortex_xdr_agentMatch7.5.2content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.5.3-
OR
paloaltonetworkscortex_xdr_agentMatch7.5.3content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.6.1-
OR
paloaltonetworkscortex_xdr_agentMatch7.6.1content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.6.2-
OR
paloaltonetworkscortex_xdr_agentMatch7.6.2content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.7-
OR
paloaltonetworkscortex_xdr_agentMatch7.7content_update330
OR
paloaltonetworkscortex_xdr_agentMatch7.7.1-
OR
paloaltonetworkscortex_xdr_agentMatch7.7.1content_update330

CNA Affected

[
  {
    "platforms": [
      "Windows"
    ],
    "product": "Cortex XDR Agent",
    "vendor": "Palo Alto Networks",
    "versions": [
      {
        "status": "affected",
        "version": "7.7.* without CU-330"
      },
      {
        "status": "unaffected",
        "version": "7.7.* with CU-330"
      },
      {
        "status": "affected",
        "version": "7.6.* without CU-330"
      },
      {
        "status": "unaffected",
        "version": "7.6.* with CU-330"
      },
      {
        "status": "affected",
        "version": "7.5 CE 7.5.* without CU-330"
      },
      {
        "status": "unaffected",
        "version": "7.5 CE 7.5.* with CU-330"
      },
      {
        "status": "affected",
        "version": "7.4.* without CU-330"
      },
      {
        "status": "unaffected",
        "version": "7.4.* with CU-330"
      },
      {
        "status": "affected",
        "version": "6.1.* without CU-330"
      },
      {
        "status": "unaffected",
        "version": "6.1.* with CU-330"
      },
      {
        "status": "affected",
        "version": "7.5.* without CU-330"
      },
      {
        "status": "unaffected",
        "version": "7.5.* with CU-330"
      }
    ]
  }
]

Social References

More

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

5.1%

Related for CVE-2022-0026