{"vulnerability": "CVE-2024-8690", "sightings": [{"uuid": "8203dbb4-e215-49e4-93f8-44d0c3d071fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8690", "type": "seen", "source": "https://security.paloaltonetworks.com/CVE-2024-8690", "content": "", "creation_timestamp": "2024-09-11T16:00:00.000000Z"}, {"uuid": "63337320-e116-42fe-bd94-7f76d26a6264", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8690", "type": "seen", "source": "https://bsky.app/profile/r-netsec.bsky.social/post/3ll27i4mpke2m", "content": "", "creation_timestamp": "2025-03-23T12:09:31.868948Z"}, {"uuid": "01b0beab-5aad-48f0-a06e-5eb1105c0320", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8690", "type": "published-proof-of-concept", "source": "https://t.me/TopCyberTechNews/441", "content": "Top Security News for Today\n\nThreat landscape for industrial automation systems in Q4 2024  \nhttps://securelist.com/ics-cert-q4-2024-report/115944/\n\nNCSC Releases Post-Quantum Cryptography Timeline  \nhttps://www.schneier.com/blog/archives/2025/03/ncsc-releases-post-quantum-cryptography-timeline.html\n\nWhat not to do with on prem virtualization  \nhttps://www.reddit.com/r/netsec/comments/1jgfvkp/what_not_to_do_with_on_prem_virtualization/\n\nThere's a big problem with browser bookmark security.  \nhttps://www.reddit.com/r/netsec/comments/1jgij4f/theres_a_big_problem_with_browser_bookmark/\n\nMy Writings Are in the LibGen AI Training Corpus  \nhttps://www.schneier.com/blog/archives/2025/03/my-writings-are-in-the-libgen-ai-training-corpus.html\n\nArrests in Tap-to-Pay Scheme Powered by Phishing  \nhttps://krebsonsecurity.com/2025/03/arrests-in-tap-to-pay-scheme-powered-by-phishing/\n\nPalo Alto Cortex XDR bypass (CVE-2024-8690)  \nhttps://www.reddit.com/r/netsec/comments/1jgra20/palo_alto_cortex_xdr_bypass_cve20248690/\n\nFollow Top Cyber News at https://t.me/TopCyberTechNews Feel free to DM me at https://twitter.com/ShayaFeedman", "creation_timestamp": "2025-03-22T21:00:35.000000Z"}, {"uuid": "8385b4ed-2568-4f92-9fcf-55e9f5411a81", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8690", "type": "seen", "source": "https://bsky.app/profile/bsidescbr.bsky.social/post/3lu73pjlvyk25", "content": "", "creation_timestamp": "2025-07-17T23:32:13.113373Z"}, {"uuid": "e049e714-981e-4a51-b847-c65509fca832", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8690", "type": "seen", "source": "https://bsky.app/profile/r-netsec-bot.bsky.social/post/3llrdsnqspd2b", "content": "", "creation_timestamp": "2025-04-01T16:58:14.360111Z"}, {"uuid": "36b75559-ca84-4fe7-af83-043bffa9b5ad", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8690", "type": "seen", "source": "https://t.me/CyberBulletin/2765", "content": "\u26a1Palo Alto Cortex XDR bypass (CVE-2024-8690).\n\n#CyberBulletin", "creation_timestamp": "2025-03-22T11:15:56.000000Z"}, {"uuid": "3b3b47a5-d336-44ce-96ab-03d747014993", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-8690", "type": "seen", "source": "https://t.me/cvedetector/5388", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2024-8690 - Palo Alto Networks Cortex XDR Agent Elevation of Privilege\", \n  \"Content\": \"CVE ID : CVE-2024-8690 \nPublished : Sept. 11, 2024, 5:15 p.m. | 16\u00a0minutes ago \nDescription : A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows administrator privileges to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"11 Sep 2024\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2024-09-11T19:32:30.000000Z"}]}