{"vulnerability": "CVE-2025-0112", "sightings": [{"uuid": "ca51dcb8-9385-4334-8f74-3718859399f4", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0112", "type": "seen", "source": "https://bsky.app/profile/ripjyr.bsky.social/post/3lhyugdjvbn2p", "content": "", "creation_timestamp": "2025-02-12T19:03:27.412703Z"}, {"uuid": "c2aaab10-f238-417a-b021-5186a2dde123", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0112", "type": "seen", "source": "https://security.paloaltonetworks.com/CVE-2025-0112", "content": "", "creation_timestamp": "2025-02-12T16:00:00.000000Z"}, {"uuid": "78287d87-08a2-456a-ba35-4c3f060bf608", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0112", "type": "seen", "source": "https://infosec.exchange/users/screaminggoat/statuses/113992177119940610", "content": "", "creation_timestamp": "2025-02-12T17:49:46.304865Z"}, {"uuid": "8e093447-4712-43f3-9eca-6776c3117bcf", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0112", "type": "seen", "source": "https://bsky.app/profile/will.willofmiletus.com/post/3lil53opfdc2d", "content": "", "creation_timestamp": "2025-02-20T01:26:29.434464Z"}, {"uuid": "df7cb7f4-723e-48be-b2de-e03ba826ab54", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2025-0112", "type": "seen", "source": "https://t.me/cvedetector/18485", "content": "{\n  \"Source\": \"CVE FEED\",\n  \"Title\": \"CVE-2025-0112 - Palo Alto Networks Cortex XDR Agent Windows Privilege Escalation Vulnerability\", \n  \"Content\": \"CVE ID : CVE-2025-0112 \nPublished : Feb. 20, 2025, 12:15 a.m. | 27\u00a0minutes ago \nDescription : A problem with a detection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices enables a user with Windows non-administrative privileges to disable the agent. This vulnerability can also be leveraged by malware to disable the Cortex XDR agent and then perform malicious activity. \nSeverity: 0.0 | NA \nVisit the link for more details, such as CVSS details, affected products, timeline, and more...\",\n  \"Detection Date\": \"20 Feb 2025\",\n  \"Type\": \"Vulnerability\"\n}\n\ud83d\udd39 t.me/cvedetector \ud83d\udd39", "creation_timestamp": "2025-02-20T02:16:28.000000Z"}]}