Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CERTFR-2024-AVI-0491
Vulnerability from certfr_avis
De multiples vulnérabilités ont été découvertes dans les produits Palo Alto Networks. Certaines d'entre elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
Vendor | Product | Description | ||
---|---|---|---|---|
Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.2.x antérieures à 6.2.3 | ||
Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 5.1.x antérieures à 5.1.12 | ||
Palo Alto Networks | Cortex XDR Agent | Cortex XDR Agent versions 7.9.x.-CE antérieures à 7.9.102-CE sur Windows | ||
Palo Alto Networks | Cortex XDR Agent | Cortex XDR Agent versions 8.1.x à 8.2.x antérieures à 8.2.1 sur Windows | ||
Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.1.x antérieures à 6.1.3 | ||
Palo Alto Networks | GlobalProtect App | GlobalProtect App versions 6.0.x antérieures à 6.0.8 | ||
Palo Alto Networks | Cortex XDR Agent | Cortex XDR Agent versions 8.3.x antérieures à 8.3.1 sur Windows | ||
Palo Alto Networks | Prisma Cloud Compute | Prisma Cloud Compute versions 32.x antérieures à 32.05 (O’Neal - Update 5) |
References
Title | Publication Time | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "$ref": "https://www.cert.ssi.gouv.fr/openapi.json", "affected_systems": [ { "description": "GlobalProtect App versions 6.2.x ant\u00e9rieures \u00e0 6.2.3", "product": { "name": "GlobalProtect App", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "GlobalProtect App versions 5.1.x ant\u00e9rieures \u00e0 5.1.12", "product": { "name": "GlobalProtect App", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Cortex XDR Agent versions 7.9.x.-CE ant\u00e9rieures \u00e0 7.9.102-CE sur Windows", "product": { "name": "Cortex XDR Agent", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Cortex XDR Agent versions 8.1.x \u00e0 8.2.x ant\u00e9rieures \u00e0 8.2.1 sur Windows", "product": { "name": "Cortex XDR Agent", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "GlobalProtect App versions 6.1.x ant\u00e9rieures \u00e0 6.1.3", "product": { "name": "GlobalProtect App", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "GlobalProtect App versions 6.0.x ant\u00e9rieures \u00e0 6.0.8", "product": { "name": "GlobalProtect App", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Cortex XDR Agent versions 8.3.x ant\u00e9rieures \u00e0 8.3.1 sur Windows", "product": { "name": "Cortex XDR Agent", "vendor": { "name": "Palo Alto Networks", "scada": false } } }, { "description": "Prisma Cloud Compute versions 32.x ant\u00e9rieures \u00e0 32.05 (O\u2019Neal - Update 5)", "product": { "name": "Prisma Cloud Compute", "vendor": { "name": "Palo Alto Networks", "scada": false } } } ], "affected_systems_content": "", "content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).", "cves": [ { "name": "CVE-2024-5908", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5908" }, { "name": "CVE-2024-5907", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5907" }, { "name": "CVE-2024-5905", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5905" }, { "name": "CVE-2024-5906", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5906" }, { "name": "CVE-2024-5909", "url": "https://www.cve.org/CVERecord?id=CVE-2024-5909" } ], "initial_release_date": "2024-06-13T00:00:00", "last_revision_date": "2024-06-13T00:00:00", "links": [], "reference": "CERTFR-2024-AVI-0491", "revisions": [ { "description": "Version initiale", "revision_date": "2024-06-13T00:00:00.000000" } ], "risks": [ { "description": "Injection de code indirecte \u00e0 distance (XSS)" }, { "description": "Contournement de la politique de s\u00e9curit\u00e9" }, { "description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es" }, { "description": "\u00c9l\u00e9vation de privil\u00e8ges" } ], "summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits Palo Alto Networks. Certaines d\u0027entre elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).", "title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Palo Alto Networks", "vendor_advisories": [ { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2024-5906", "url": "https://security.paloaltonetworks.com/CVE-2024-5906" }, { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2024-5908", "url": "https://security.paloaltonetworks.com/CVE-2024-5908" }, { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2024-5907", "url": "https://security.paloaltonetworks.com/CVE-2024-5907" }, { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2024-5905", "url": "https://security.paloaltonetworks.com/CVE-2024-5905" }, { "published_at": "2024-06-12", "title": "Bulletin de s\u00e9curit\u00e9 Palo Alto Networks CVE-2024-5909", "url": "https://security.paloaltonetworks.com/CVE-2024-5909" } ] }
CVE-2024-5909 (GCVE-0-2024-5909)
Vulnerability from cvelistv5
Published
2024-06-12 16:29
Modified
2024-08-01 21:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 8.2.0 < 8.2.1 Version: 8.1.0 < 8.1.2 Version: 7.9-CE < 7.9.102-CE |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5909", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T19:51:54.433806Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T19:52:05.711Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.192Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5909" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "8.4.0" }, { "status": "unaffected", "version": "8.3.0" }, { "changes": [ { "at": "8.2.1", "status": "unaffected" } ], "lessThan": "8.2.1", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "changes": [ { "at": "8.1.2", "status": "unaffected" } ], "lessThan": "8.1.2", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "changes": [ { "at": "7.9.102-CE", "status": "unaffected" } ], "lessThan": "7.9.102-CE", "status": "affected", "version": "7.9-CE", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Manuel Feifel of VUREX (InfoGuard AG) for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity.\u003c/p\u003e" } ], "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-578", "descriptions": [ { "lang": "en", "value": "CAPEC-578 Disable Security Software" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 6.8, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:29:23.822Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5909" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions.\u003c/p\u003e" } ], "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-21835", "CPATR-21826" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Windows User Can Disable the Agent", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectedKeywords": [ "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE", "Cortex XDR Agent 7.5-CE", "Cortex XDR Agent 5.0", "Cortex XDR Agent" ], "affectsSummary": { "affected": [ "None", "None", "\u003c 8.2.1 on Windows", "\u003c 8.1.2 on Windows", "\u003c 7.9.102-CE on Windows" ], "appliesTo": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "product_versions": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "unaffected": [ "All", "All", "\u003e= 8.2.1 on Windows", "\u003e= 8.1.2 on Windows", "\u003e= 7.9.102-CE on Windows" ], "unknown": [ "", "", "", "", "" ] }, "owner": "abaishya", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-CPATR-21826", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Local Windows User Can Disable the Agent" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "version_affected": "=", "version_name": "8.3", "version_value": "None" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.1" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.2", "version_value": "8.2.1" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.1", "version_value": "8.1.2" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.1", "version_value": "8.1.2" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "version_affected": "!", "version_name": "8.3", "version_value": "All" }, { "version_affected": "=", "version_name": "8.4", "version_value": "None" }, { "version_affected": "!", "version_name": "8.4", "version_value": "All" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Manuel Feifel of VUREX (InfoGuard AG) for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a low privileged local Windows user to disable the agent. This issue may be leveraged by malware to disable the Cortex XDR agent and then to perform malicious activity." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 6.8, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:L/UI:N/VC:N/VI:N/VA:H/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "HIGH", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-CPATR-21826" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-21835", "CPATR-21826" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE", "Cortex XDR Agent 7.5-CE", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5909", "datePublished": "2024-06-12T16:29:23.822Z", "dateReserved": "2024-06-12T15:27:55.683Z", "dateUpdated": "2024-08-01T21:25:03.192Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5905 (GCVE-0-2024-5905)
Vulnerability from cvelistv5
Published
2024-06-12 16:20
Modified
2024-08-01 21:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-346 - Origin Validation Error
Summary
A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.9-CE < 7.9.102-CE Version: 8.1.0 < 8.1.2 Version: 8.2.0 < 8.2.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5905", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T17:58:42.722169Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T17:58:51.232Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.270Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5905" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "7.9.102-CE", "status": "unaffected" } ], "lessThan": "7.9.102-CE", "status": "affected", "version": "7.9-CE", "versionType": "custom" }, { "changes": [ { "at": "8.1.2", "status": "unaffected" } ], "lessThan": "8.1.2", "status": "affected", "version": "8.1.0", "versionType": "custom" }, { "changes": [ { "at": "8.2.1", "status": "unaffected" } ], "lessThan": "8.2.1", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "status": "unaffected", "version": "8.3.0" }, { "status": "unaffected", "version": "8.4.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Manuel Feifel of VUREX (InfoGuard AG) for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability.\u003c/p\u003e" } ], "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-578", "descriptions": [ { "lang": "en", "value": "CAPEC-578 Disable Security Software" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "YES", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 2, "baseSeverity": "LOW", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-346", "description": "CWE-346 Origin Validation Error", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:22:57.869Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5905" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions.\u003c/p\u003e" } ], "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-21727" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Windows User Can Disrupt Functionality of the Agent", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectsSummary": { "affected": [ "None", "None", "\u003c 8.2.1 on Windows", "\u003c 8.1.2 on Windows", "\u003c 7.9.102-CE on Windows" ], "appliesTo": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "product_versions": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "unaffected": [ "All", "All", "\u003e= 8.2.1 on Windows", "\u003e= 8.1.2 on Windows", "\u003e= 7.9.102-CE on Windows" ], "unknown": [ "", "", "", "", "" ] }, "owner": "abaishya", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-CPATR-21727", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Local Windows User Can Disrupt Functionality of the Agent" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.1", "version_value": "8.1.2" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.1", "version_value": "8.1.2" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.1" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.2", "version_value": "8.2.1" }, { "version_affected": "=", "version_name": "8.3", "version_value": "None" }, { "version_affected": "!", "version_name": "8.3", "version_value": "All" }, { "version_affected": "=", "version_name": "8.4", "version_value": "None" }, { "version_affected": "!", "version_name": "8.4", "version_value": "All" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Manuel Feifel of VUREX (InfoGuard AG) for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A problem with a protection mechanism in the Palo Alto Networks Cortex XDR agent on Windows devices allows a local low privileged Windows user to disrupt some functionality of the agent. However, they are not able to disrupt Cortex XDR agent protection mechanisms using this vulnerability." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "YES", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 2, "baseSeverity": "LOW", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:L/SC:N/SI:N/SA:N/AU:Y/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-346 Origin Validation Error" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-CPATR-21727" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.1.2, Cortex XDR agent 8.2.1, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-21727" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5905", "datePublished": "2024-06-12T16:20:35.039Z", "dateReserved": "2024-06-12T15:27:53.779Z", "dateUpdated": "2024-08-01T21:25:03.270Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5906 (GCVE-0-2024-5906)
Vulnerability from cvelistv5
Published
2024-06-12 16:22
Modified
2024-08-01 21:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Summary
A cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute software enables a malicious administrator with add/edit permissions for identity providers to store a JavaScript payload using the web interface on Prisma Cloud Compute. This enables a malicious administrator to perform actions in the context of another user's browser when accessed by that other user.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Prisma Cloud Compute |
Version: 32 < 32.05 (O’Neal - Update 5) |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:paloaltonetworks:prisma_cloud:*:*:*:*:compute:*:*:*" ], "defaultStatus": "unknown", "product": "prisma_cloud", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "32.05", "status": "affected", "version": "32", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:prisma_cloud:*:*:*:*:compute:*:*:*" ], "defaultStatus": "unknown", "product": "prisma_cloud", "vendor": "paloaltonetworks", "versions": [ { "lessThanOrEqual": "32.05", "status": "unaffected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5906", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2024-06-12T18:11:55.656236Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-12T18:17:47.920Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.163Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5906" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Prisma Cloud Compute", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "32.05 (O\u2019Neal - Update 5)", "status": "unaffected" } ], "lessThan": "32.05 (O\u2019Neal - Update 5)", "status": "affected", "version": "32", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Tomasz Stachowicz for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute software enables a malicious administrator with add/edit permissions for identity providers to store a JavaScript payload using the web interface on Prisma Cloud Compute. This enables a malicious administrator to perform actions in the context of another user\u0027s browser when accessed by that other user.\u003c/p\u003e" } ], "value": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute software enables a malicious administrator with add/edit permissions for identity providers to store a JavaScript payload using the web interface on Prisma Cloud Compute. This enables a malicious administrator to perform actions in the context of another user\u0027s browser when accessed by that other user." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-592", "descriptions": [ { "lang": "en", "value": "CAPEC-592 Stored XSS" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "AUTOMATIC", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:22:38.881Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5906" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in Prisma Cloud Compute 32.05 (O\u0027Neal - Update 5) and all later versions.\u003c/p\u003e" } ], "value": "This issue is fixed in Prisma Cloud Compute 32.05 (O\u0027Neal - Update 5) and all later versions." } ], "source": { "defect": [ "CWP-56273" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "Prisma Cloud Compute: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectsSummary": { "affected": [ "\u003c 32.05 (O\u2019Neal - Update 5)" ], "appliesTo": [ "Prisma Cloud Compute 32" ], "product_versions": [ "Prisma Cloud Compute 32" ], "unaffected": [ "\u003e= 32.05 (O\u2019Neal - Update 5)" ], "unknown": [ "" ] }, "owner": "abaishya", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-CWP-56273", "STATE": "PUBLIC", "TITLE": "Prisma Cloud Compute: Stored Cross-Site Scripting (XSS) Vulnerability in the Web Interface" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Prisma Cloud Compute", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "32", "version_value": "32.05 (O\u2019Neal - Update 5)" }, { "version_affected": "!\u003e=", "version_name": "32", "version_value": "32.05 (O\u2019Neal - Update 5)" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Tomasz Stachowicz and Declap Harp for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A cross-site scripting (XSS) vulnerability in Palo Alto Networks Prisma Cloud Compute software enables a malicious administrator with add/edit permissions for identity providers to store a JavaScript payload using the web interface on Prisma Cloud Compute. This enables a malicious administrator to perform actions in the context of another user\u0027s browser when accessed by that other user." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "NO", "Recovery": "AUTOMATIC", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "NETWORK", "baseScore": 4.8, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "PASSIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:N/PR:H/UI:P/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/AU:N/R:A/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-CWP-56273" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Prisma Cloud Compute 32.05 (O\u0027Neal - Update 5) and all later versions." } ], "source": { "defect": [ "CWP-56273" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5906", "datePublished": "2024-06-12T16:22:38.881Z", "dateReserved": "2024-06-12T15:27:55.088Z", "dateUpdated": "2024-08-01T21:25:03.163Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5907 (GCVE-0-2024-5907)
Vulnerability from cvelistv5
Published
2024-06-12 16:26
Modified
2024-08-01 21:25
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-269 - Improper Privilege Management
Summary
A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 7.9-CE < 7.9.102-CE Version: 8.1.0 Version: 8.2.0 < 8.2.3 Version: 8.3.0 < 8.3.1 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-5907", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2023-11-08T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-14T03:56:05.821Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.047Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5907" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "7.9.102-CE", "status": "unaffected" } ], "lessThan": "7.9.102-CE", "status": "affected", "version": "7.9-CE", "versionType": "custom" }, { "status": "affected", "version": "8.1.0" }, { "changes": [ { "at": "8.2.3", "status": "unaffected" } ], "lessThan": "8.2.3", "status": "affected", "version": "8.2.0", "versionType": "custom" }, { "changes": [ { "at": "8.3.1", "status": "unaffected" } ], "lessThan": "8.3.1", "status": "affected", "version": "8.3.0", "versionType": "custom" }, { "status": "unaffected", "version": "8.4.0" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Orange Cyberdefense Switzerland\u0027s Research Team for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.\u003c/p\u003e" } ], "value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 5.2, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-269", "description": "CWE-269 Improper Privilege Management", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:26:39.742Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5907" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024.\u003c/p\u003e" } ], "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024." } ], "source": { "defect": [ "CPATR-23348" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Privilege Escalation (PE) Vulnerability", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Current-Status": "Verify with Alain how they want to be acknowledged", "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectsSummary": { "affected": [ "None", "\u003c 8.3.1 on Windows", "\u003c 8.2.3 on Windows", "All", "\u003c 7.9.102-CE on Windows" ], "appliesTo": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "product_versions": [ "Cortex XDR Agent 8.4", "Cortex XDR Agent 8.3", "Cortex XDR Agent 8.2", "Cortex XDR Agent 8.1", "Cortex XDR Agent 7.9-CE" ], "unaffected": [ "All", "\u003e= 8.3.1 on Windows", "\u003e= 8.2.3 on Windows", "None", "\u003e= 7.9.102-CE on Windows" ], "unknown": [ "", "", "", "", "" ] }, "owner": "abaishya", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-CPATR-23348", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Local Privilege Escalation (PE) Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.9-CE", "version_value": "7.9.102-CE" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.2", "version_value": "8.2.3" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.2", "version_value": "8.2.3" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "8.3", "version_value": "8.3.1" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "8.3", "version_value": "8.3.1" }, { "version_affected": "=", "version_name": "8.4", "version_value": "None" }, { "version_affected": "!", "version_name": "8.4", "version_value": "All" }, { "version_affected": "=", "version_name": "8.1", "version_value": "All" }, { "version_affected": "!", "version_name": "8.1", "version_value": "None" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Alain Mowat of Orange Cyberdefense for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "HIGH", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 5.2, "baseSeverity": "MEDIUM", "privilegesRequired": "LOW", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "NONE", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-269 Improper Privilege Management" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-CPATR-23348" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024." } ], "source": { "defect": [ "CPATR-23348" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5907", "datePublished": "2024-06-12T16:26:39.742Z", "dateReserved": "2024-06-12T15:27:55.262Z", "dateUpdated": "2024-08-01T21:25:03.047Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-5908 (GCVE-0-2024-5908)
Vulnerability from cvelistv5
Published
2024-06-12 16:28
Modified
2024-08-09 19:08
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-532 - Insertion of Sensitive Information into Log File
Summary
A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.
References
URL | Tags | ||||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | GlobalProtect App |
Version: 5.1.0 < 5.1.12 Version: 6.0.0 < 6.0.8 Version: 6.1.0 < 6.1.3 Version: 6.2.0 < 6.2.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-01T21:25:03.175Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "vendor-advisory", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5908" } ], "title": "CVE Program Container" }, { "affected": [ { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:5.1:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "5.1.12", "status": "affected", "version": "5.1", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.0.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "6.0.8", "status": "affected", "version": "6.0.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.1.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "6.1.3", "status": "affected", "version": "6.1.0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:paloaltonetworks:globalprotect:6.2.0:*:*:*:*:*:*:*" ], "defaultStatus": "unaffected", "product": "globalprotect", "vendor": "paloaltonetworks", "versions": [ { "lessThan": "6.2.3", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-5908", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-08-09T18:53:54.949374Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-08-09T19:08:25.260Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "GlobalProtect App", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "5.1.12", "status": "unaffected" } ], "lessThan": "5.1.12", "status": "affected", "version": "5.1.0", "versionType": "custom" }, { "changes": [ { "at": "6.0.8", "status": "unaffected" } ], "lessThan": "6.0.8", "status": "affected", "version": "6.0.0", "versionType": "custom" }, { "changes": [ { "at": "6.1.3", "status": "unaffected" } ], "lessThan": "6.1.3", "status": "affected", "version": "6.1.0", "versionType": "custom" }, { "changes": [ { "at": "6.2.3", "status": "unaffected" } ], "lessThan": "6.2.3", "status": "affected", "version": "6.2.0", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "type": "finder", "value": "Palo Alto Networks thanks Denis Faiustov and Ruslan Sayfiev of GMO Cybersecurity by IERAE for discovering and reporting this issue." } ], "datePublic": "2024-06-12T07:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eA problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs.\u003c/p\u003e" } ], "value": "A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003ePalo Alto Networks is not aware of any malicious exploitation of this issue.\u003c/p\u003e" } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-150", "descriptions": [ { "lang": "en", "value": "CAPEC-150 Collect Data from Common Resource Locations" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 5.5, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-532", "description": "CWE-532: Insertion of Sensitive Information into Log File", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-06-12T16:28:08.131Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2024-5908" } ], "solutions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions.\u003c/p\u003e\u003cp\u003eCustomers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect.\u003c/p\u003e" } ], "value": "This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions.\n\nCustomers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect." } ], "source": { "defect": [ "GPC-18597" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T16:00:00.000Z", "value": "Initial publication" } ], "title": "GlobalProtect App: Encrypted Credential Exposure via Log Files", "x_generator": { "engine": "vulnogram 0.1.0-rc1" }, "x_legacyV4Record": { "CNA_private": { "Priority": "normal", "STATE": "review", "TYPE": "advisory", "affectsSummary": { "affected": [ "\u003c 6.2.3", "\u003c 6.1.3", "\u003c 6.0.8", "\u003c 5.1.12" ], "appliesTo": [ "GlobalProtect App 6.2", "GlobalProtect App 6.1", "GlobalProtect App 6.0", "GlobalProtect App 5.1" ], "product_versions": [ "GlobalProtect App 6.2", "GlobalProtect App 6.1", "GlobalProtect App 6.0", "GlobalProtect App 5.1" ], "unaffected": [ "\u003e= 6.2.3", "\u003e= 6.1.3", "\u003e= 6.0.8", "\u003e= 5.1.12" ], "unknown": [ "", "", "", "" ] }, "owner": "carjones", "publish": { "month": "06", "year": "2024", "ym": "2024-06" }, "share_with_CVE": true, "show_cvss": true }, "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2024-06-12T16:00:00.000Z", "ID": "CVE-2023-case-GPC-18597", "STATE": "PUBLIC", "TITLE": "GlobalProtect App: Encrypted Credential Exposure via Log Files" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "GlobalProtect App", "version": { "version_data": [ { "version_affected": "\u003c", "version_name": "5.1", "version_value": "5.1.12" }, { "version_affected": "\u003c", "version_name": "6.0", "version_value": "6.0.8" }, { "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.3" }, { "version_affected": "\u003c", "version_name": "6.2", "version_value": "6.2.3" }, { "version_affected": "!\u003e=", "version_name": "5.1", "version_value": "5.1.12" }, { "version_affected": "!\u003e=", "version_name": "6.0", "version_value": "6.0.8" }, { "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.3" }, { "version_affected": "!\u003e=", "version_name": "6.2", "version_value": "6.2.3" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Denis Faiustov and Ruslan Sayfiev of GMO Cybersecurity by IERAE for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A problem with the Palo Alto Networks GlobalProtect app can result in exposure of encrypted user credentials, used for connecting to GlobalProtect, in application logs. Normally, these application logs are only viewable by local users and are included when generating logs for troubleshooting purposes. This means that these encrypted credentials are exposed to recipients of the application logs." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "vulnogram 0.1.0-rc1" }, "impact": { "cvss": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "PRESENT", "attackVector": "NETWORK", "baseScore": 5.5, "baseSeverity": "MEDIUM", "privilegesRequired": "NONE", "providerUrgency": "AMBER", "subAvailabilityImpact": "HIGH", "subConfidentialityImpact": "HIGH", "subIntegrityImpact": "HIGH", "userInteraction": "ACTIVE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:N/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "NONE", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "NONE", "vulnerabilityResponseEffort": "MODERATE" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-532: Insertion of Sensitive Information into Log File" } ] } ] }, "references": { "reference_data": [ { "refsource": "CONFIRM", "url": "https://security.paloaltonetworks.com/CVE-2023-case-GPC-18597" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in GlobalProtect app 5.1.12, GlobalProtect app 6.0.8, GlobalProtect app 6.1.3, GlobalProtect app 6.2.3, and all later GlobalProtect app versions.Customers looking to protect against the impact of this encrypted password disclosure should first delete PanGPS.log files from the GlobalProtect installation directory on all endpoints and then force a rotation of user passwords that are used to connect to GlobalProtect." } ], "source": { "defect": [ "GPC-18597" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2024-06-12T00:00:00", "value": "Initial publication" } ], "x_advisoryEoL": false } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2024-5908", "datePublished": "2024-06-12T16:28:08.131Z", "dateReserved": "2024-06-12T15:27:55.490Z", "dateUpdated": "2024-08-09T19:08:25.260Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…