CVE-2025-4228 (GCVE-0-2025-4228)
Vulnerability from cvelistv5
Published
2025-06-12 23:41
Modified
2025-06-14 03:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-266 - Incorrect Privilege Assignment
Summary
An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex® XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Broker VM |
Version: 27.0.0 < 27.0.26 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2025-4228", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2025-06-13T00:00:00+00:00", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-06-14T03:56:20.140Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "product": "Cortex XDR Broker VM", "vendor": "Palo Alto Networks", "versions": [ { "changes": [ { "at": "27.0.26", "status": "unaffected" } ], "lessThan": "27.0.26", "status": "affected", "version": "27.0.0", "versionType": "custom" } ] } ], "configurations": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e" } ], "value": "No special configuration is required to be affected by this issue." } ], "credits": [ { "lang": "en", "type": "finder", "value": "This issue was discovered during an internal penetration test" } ], "datePublic": "2025-06-11T16:00:00.000Z", "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex\u00ae XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root." } ], "value": "An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex\u00ae XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root." } ], "exploits": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "impacts": [ { "capecId": "CAPEC-233", "descriptions": [ { "lang": "en", "value": "CAPEC-233 Privilege Escalation" } ] } ], "metrics": [ { "cvssV4_0": { "Automatable": "NO", "Recovery": "USER", "Safety": "NOT_DEFINED", "attackComplexity": "LOW", "attackRequirements": "NONE", "attackVector": "LOCAL", "baseScore": 4.6, "baseSeverity": "MEDIUM", "privilegesRequired": "HIGH", "providerUrgency": "AMBER", "subAvailabilityImpact": "NONE", "subConfidentialityImpact": "NONE", "subIntegrityImpact": "NONE", "userInteraction": "NONE", "valueDensity": "DIFFUSE", "vectorString": "CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber", "version": "4.0", "vulnAvailabilityImpact": "LOW", "vulnConfidentialityImpact": "LOW", "vulnIntegrityImpact": "LOW", "vulnerabilityResponseEffort": "MODERATE" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-266", "description": "CWE-266 Incorrect Privilege Assignment", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-06-12T23:41:37.071Z", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "vendor-advisory" ], "url": "https://security.paloaltonetworks.com/CVE-2025-4228" } ], "solutions": [ { "lang": "eng", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eThis issue is fixed in Cortex XDR Broker VM 27.0.26, and all later Cortex XDR Broker VM versions.\u003cbr\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eIf you enabled automatic upgrades for Broker VM, then no action is required at this time. \u003c/li\u003e\u003cli\u003eIf you did not enable automatic upgrades, then we recommend that you do so for Broker VM to ensure that you always have the latest security patches installed in your software.\u003c/li\u003e\u003c/ul\u003e" } ], "value": "This issue is fixed in Cortex XDR Broker VM 27.0.26, and all later Cortex XDR Broker VM versions.\n\n\n * If you enabled automatic upgrades for Broker VM, then no action is required at this time. \n * If you did not enable automatic upgrades, then we recommend that you do so for Broker VM to ensure that you always have the latest security patches installed in your software." } ], "source": { "defect": [ "CRTX-101363", "CRTX-101771" ], "discovery": "INTERNAL" }, "timeline": [ { "lang": "en", "time": "2025-06-11T16:00:00.000Z", "value": "Initial Publication" } ], "title": "Cortex XDR Broker VM: Privilege Escalation (PE) Vulnerability", "workarounds": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cp\u003eNo known workarounds or mitigations exist for this issue.\u003c/p\u003e" } ], "value": "No known workarounds or mitigations exist for this issue." } ], "x_affectedList": [ "Cortex XDR Broker VM 26.0.0", "Cortex XDR Broker VM 26.0.1", "Cortex XDR Broker VM 26.0.2", "Cortex XDR Broker VM 26.0.3", "Cortex XDR Broker VM 26.0.4", "Cortex XDR Broker VM 26.0.5", "Cortex XDR Broker VM 26.0.6", "Cortex XDR Broker VM 26.0.7", "Cortex XDR Broker VM 26.0.8", "Cortex XDR Broker VM 26.0.9", "Cortex XDR Broker VM 26.0.10", "Cortex XDR Broker VM 26.0.11", "Cortex XDR Broker VM 26.0.12", "Cortex XDR Broker VM 26.0.13", "Cortex XDR Broker VM 26.0.14", "Cortex XDR Broker VM 26.0.15", "Cortex XDR Broker VM 26.0.16", "Cortex XDR Broker VM 26.0.17", "Cortex XDR Broker VM 26.0.18", "Cortex XDR Broker VM 26.0.19", "Cortex XDR Broker VM 26.0.20", "Cortex XDR Broker VM 26.0.21", "Cortex XDR Broker VM 26.0.22", "Cortex XDR Broker VM 26.0.23", "Cortex XDR Broker VM 26.0.24", "Cortex XDR Broker VM 26.0.25", "Cortex XDR Broker VM 26.0.26", "Cortex XDR Broker VM 26.0.27", "Cortex XDR Broker VM 26.0.28", "Cortex XDR Broker VM 26.0.29", "Cortex XDR Broker VM 26.0.30", "Cortex XDR Broker VM 26.0.31", "Cortex XDR Broker VM 26.0.32", "Cortex XDR Broker VM 26.0.33", "Cortex XDR Broker VM 26.0.34", "Cortex XDR Broker VM 26.0.35", "Cortex XDR Broker VM 26.0.36", "Cortex XDR Broker VM 26.0.37", "Cortex XDR Broker VM 26.0.38", "Cortex XDR Broker VM 26.0.39", "Cortex XDR Broker VM 26.0.40", "Cortex XDR Broker VM 26.0.41", "Cortex XDR Broker VM 26.0.42", "Cortex XDR Broker VM 26.0.43", "Cortex XDR Broker VM 26.0.44", "Cortex XDR Broker VM 26.0.45", "Cortex XDR Broker VM 26.0.46", "Cortex XDR Broker VM 26.0.47", "Cortex XDR Broker VM 26.0.48", "Cortex XDR Broker VM 26.0.49", "Cortex XDR Broker VM 26.0.50", "Cortex XDR Broker VM 26.0.51", "Cortex XDR Broker VM 26.0.52", "Cortex XDR Broker VM 26.0.53", "Cortex XDR Broker VM 26.0.54", "Cortex XDR Broker VM 26.0.55", "Cortex XDR Broker VM 26.0.56", "Cortex XDR Broker VM 26.0.57", "Cortex XDR Broker VM 26.0.58", "Cortex XDR Broker VM 26.0.59", "Cortex XDR Broker VM 26.0.60", "Cortex XDR Broker VM 26.0.61", "Cortex XDR Broker VM 26.0.62", "Cortex XDR Broker VM 26.0.63", "Cortex XDR Broker VM 26.0.64", "Cortex XDR Broker VM 26.0.65", "Cortex XDR Broker VM 26.0.66", "Cortex XDR Broker VM 26.0.67", "Cortex XDR Broker VM 26.0.68", "Cortex XDR Broker VM 26.0.69", "Cortex XDR Broker VM 26.0.70", "Cortex XDR Broker VM 26.0.71", "Cortex XDR Broker VM 26.0.72", "Cortex XDR Broker VM 26.0.73", "Cortex XDR Broker VM 26.0.74", "Cortex XDR Broker VM 26.0.75", "Cortex XDR Broker VM 26.0.76", "Cortex XDR Broker VM 26.0.77", "Cortex XDR Broker VM 26.0.78", "Cortex XDR Broker VM 26.0.79", "Cortex XDR Broker VM 26.0.80", "Cortex XDR Broker VM 26.0.81", "Cortex XDR Broker VM 26.0.82", "Cortex XDR Broker VM 26.0.83", "Cortex XDR Broker VM 26.0.84", "Cortex XDR Broker VM 26.0.85", "Cortex XDR Broker VM 26.0.86", "Cortex XDR Broker VM 26.0.87", "Cortex XDR Broker VM 26.0.88", "Cortex XDR Broker VM 26.0.89", "Cortex XDR Broker VM 26.0.90", "Cortex XDR Broker VM 26.0.91", "Cortex XDR Broker VM 26.0.92", "Cortex XDR Broker VM 26.0.93", "Cortex XDR Broker VM 26.0.94", "Cortex XDR Broker VM 26.0.95", "Cortex XDR Broker VM 26.0.96", "Cortex XDR Broker VM 26.0.97", "Cortex XDR Broker VM 26.0.98", "Cortex XDR Broker VM 26.0.99", "Cortex XDR Broker VM 26.0.100", "Cortex XDR Broker VM 26.0.101", "Cortex XDR Broker VM 26.0.102", "Cortex XDR Broker VM 26.0.103", "Cortex XDR Broker VM 26.0.104", "Cortex XDR Broker VM 26.0.105", "Cortex XDR Broker VM 26.0.106", "Cortex XDR Broker VM 26.0.107", "Cortex XDR Broker VM 26.0.108", "Cortex XDR Broker VM 26.0.109", "Cortex XDR Broker VM 26.0.110", "Cortex XDR Broker VM 26.0.111", "Cortex XDR Broker VM 26.0.112", "Cortex XDR Broker VM 26.0.113", "Cortex XDR Broker VM 26.0.114", "Cortex XDR Broker VM 26.0.115", "Cortex XDR Broker VM 26.0.116", "Cortex XDR Broker VM 26.0.117", "Cortex XDR Broker VM 26.0.118" ], "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2025-4228", "datePublished": "2025-06-12T23:41:37.071Z", "dateReserved": "2025-05-02T19:10:41.205Z", "dateUpdated": "2025-06-14T03:56:20.140Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2025-4228\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2025-06-13T00:15:23.233\",\"lastModified\":\"2025-06-16T12:32:18.840\",\"vulnStatus\":\"Awaiting Analysis\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex\u00ae XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de asignaci\u00f3n incorrecta de privilegios en Palo Alto Networks Cortex\u00ae XDR Broker VM permite que un usuario administrativo autenticado ejecute ciertos archivos disponibles dentro de Broker VM y escale sus privilegios a root.\"}],\"metrics\":{\"cvssMetricV40\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"4.0\",\"vectorString\":\"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/E:X/CR:X/IR:X/AR:X/MAV:X/MAC:X/MAT:X/MPR:X/MUI:X/MVC:X/MVI:X/MVA:X/MSC:X/MSI:X/MSA:X/S:X/AU:N/R:U/V:D/RE:M/U:Amber\",\"baseScore\":4.6,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"attackRequirements\":\"NONE\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"vulnConfidentialityImpact\":\"LOW\",\"vulnIntegrityImpact\":\"LOW\",\"vulnAvailabilityImpact\":\"LOW\",\"subConfidentialityImpact\":\"NONE\",\"subIntegrityImpact\":\"NONE\",\"subAvailabilityImpact\":\"NONE\",\"exploitMaturity\":\"NOT_DEFINED\",\"confidentialityRequirement\":\"NOT_DEFINED\",\"integrityRequirement\":\"NOT_DEFINED\",\"availabilityRequirement\":\"NOT_DEFINED\",\"modifiedAttackVector\":\"NOT_DEFINED\",\"modifiedAttackComplexity\":\"NOT_DEFINED\",\"modifiedAttackRequirements\":\"NOT_DEFINED\",\"modifiedPrivilegesRequired\":\"NOT_DEFINED\",\"modifiedUserInteraction\":\"NOT_DEFINED\",\"modifiedVulnConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedVulnIntegrityImpact\":\"NOT_DEFINED\",\"modifiedVulnAvailabilityImpact\":\"NOT_DEFINED\",\"modifiedSubConfidentialityImpact\":\"NOT_DEFINED\",\"modifiedSubIntegrityImpact\":\"NOT_DEFINED\",\"modifiedSubAvailabilityImpact\":\"NOT_DEFINED\",\"Safety\":\"NOT_DEFINED\",\"Automatable\":\"NO\",\"Recovery\":\"USER\",\"valueDensity\":\"DIFFUSE\",\"vulnerabilityResponseEffort\":\"MODERATE\",\"providerUrgency\":\"AMBER\"}}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-266\"}]}],\"references\":[{\"url\":\"https://security.paloaltonetworks.com/CVE-2025-4228\",\"source\":\"psirt@paloaltonetworks.com\"}]}}", "vulnrichment": { "containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-4228\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-06-13T14:04:25.736522Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-06-13T14:04:29.938Z\"}}], \"cna\": {\"title\": \"Cortex XDR Broker VM: Privilege Escalation (PE) Vulnerability\", \"source\": {\"defect\": [\"CRTX-101363\", \"CRTX-101771\"], \"discovery\": \"INTERNAL\"}, \"credits\": [{\"lang\": \"en\", \"type\": \"finder\", \"value\": \"This issue was discovered during an internal penetration test\"}], \"impacts\": [{\"capecId\": \"CAPEC-233\", \"descriptions\": [{\"lang\": \"en\", \"value\": \"CAPEC-233 Privilege Escalation\"}]}], \"metrics\": [{\"format\": \"CVSS\", \"cvssV4_0\": {\"Safety\": \"NOT_DEFINED\", \"version\": \"4.0\", \"Recovery\": \"USER\", \"baseScore\": 4.6, \"Automatable\": \"NO\", \"attackVector\": \"LOCAL\", \"baseSeverity\": \"MEDIUM\", \"valueDensity\": \"DIFFUSE\", \"vectorString\": \"CVSS:4.0/AV:L/AC:L/AT:N/PR:H/UI:N/VC:L/VI:L/VA:L/SC:N/SI:N/SA:N/AU:N/R:U/V:D/RE:M/U:Amber\", \"providerUrgency\": \"AMBER\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"attackRequirements\": \"NONE\", \"privilegesRequired\": \"HIGH\", \"subIntegrityImpact\": \"NONE\", \"vulnIntegrityImpact\": \"LOW\", \"subAvailabilityImpact\": \"NONE\", \"vulnAvailabilityImpact\": \"LOW\", \"subConfidentialityImpact\": \"NONE\", \"vulnConfidentialityImpact\": \"LOW\", \"vulnerabilityResponseEffort\": \"MODERATE\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"Palo Alto Networks\", \"product\": \"Cortex XDR Broker VM\", \"versions\": [{\"status\": \"affected\", \"changes\": [{\"at\": \"27.0.26\", \"status\": \"unaffected\"}], \"version\": \"27.0.0\", \"lessThan\": \"27.0.26\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}], \"exploits\": [{\"lang\": \"en\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"Palo Alto Networks is not aware of any malicious exploitation of this issue.\", \"base64\": false}]}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2025-06-11T16:00:00.000Z\", \"value\": \"Initial Publication\"}], \"solutions\": [{\"lang\": \"eng\", \"value\": \"This issue is fixed in Cortex XDR Broker VM 27.0.26, and all later Cortex XDR Broker VM versions.\\n\\n\\n * If you enabled automatic upgrades for Broker VM, then no action is required at this time. \\n * If you did not enable automatic upgrades, then we recommend that you do so for Broker VM to ensure that you always have the latest security patches installed in your software.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eThis issue is fixed in Cortex XDR Broker VM 27.0.26, and all later Cortex XDR Broker VM versions.\u003cbr\u003e\u003c/p\u003e\u003cul\u003e\u003cli\u003eIf you enabled automatic upgrades for Broker VM, then no action is required at this time. \u003c/li\u003e\u003cli\u003eIf you did not enable automatic upgrades, then we recommend that you do so for Broker VM to ensure that you always have the latest security patches installed in your software.\u003c/li\u003e\u003c/ul\u003e\", \"base64\": false}]}], \"datePublic\": \"2025-06-11T16:00:00.000Z\", \"references\": [{\"url\": \"https://security.paloaltonetworks.com/CVE-2025-4228\", \"tags\": [\"vendor-advisory\"]}], \"workarounds\": [{\"lang\": \"en\", \"value\": \"No known workarounds or mitigations exist for this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eNo known workarounds or mitigations exist for this issue.\u003c/p\u003e\", \"base64\": false}]}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex\\u00ae XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"An incorrect privilege assignment vulnerability in Palo Alto Networks Cortex\\u00ae XDR Broker VM allows an authenticated administrative user to execute certain files available within the Broker VM and escalate their privileges to root.\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-266\", \"description\": \"CWE-266 Incorrect Privilege Assignment\"}]}], \"configurations\": [{\"lang\": \"en\", \"value\": \"No special configuration is required to be affected by this issue.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cp\u003eNo special configuration is required to be affected by this issue.\u003c/p\u003e\", \"base64\": false}]}], \"x_affectedList\": [\"Cortex XDR Broker VM 26.0.0\", \"Cortex XDR Broker VM 26.0.1\", \"Cortex XDR Broker VM 26.0.2\", \"Cortex XDR Broker VM 26.0.3\", \"Cortex XDR Broker VM 26.0.4\", \"Cortex XDR Broker VM 26.0.5\", \"Cortex XDR Broker VM 26.0.6\", \"Cortex XDR Broker VM 26.0.7\", \"Cortex XDR Broker VM 26.0.8\", \"Cortex XDR Broker VM 26.0.9\", \"Cortex XDR Broker VM 26.0.10\", \"Cortex XDR Broker VM 26.0.11\", \"Cortex XDR Broker VM 26.0.12\", \"Cortex XDR Broker VM 26.0.13\", \"Cortex XDR Broker VM 26.0.14\", \"Cortex XDR Broker VM 26.0.15\", \"Cortex XDR Broker VM 26.0.16\", \"Cortex XDR Broker VM 26.0.17\", \"Cortex XDR Broker VM 26.0.18\", \"Cortex XDR Broker VM 26.0.19\", \"Cortex XDR Broker VM 26.0.20\", \"Cortex XDR Broker VM 26.0.21\", \"Cortex XDR Broker VM 26.0.22\", \"Cortex XDR Broker VM 26.0.23\", \"Cortex XDR Broker VM 26.0.24\", \"Cortex XDR Broker VM 26.0.25\", \"Cortex XDR Broker VM 26.0.26\", \"Cortex XDR Broker VM 26.0.27\", \"Cortex XDR Broker VM 26.0.28\", \"Cortex XDR Broker VM 26.0.29\", \"Cortex XDR Broker VM 26.0.30\", \"Cortex XDR Broker VM 26.0.31\", \"Cortex XDR Broker VM 26.0.32\", \"Cortex XDR Broker VM 26.0.33\", \"Cortex XDR Broker VM 26.0.34\", \"Cortex XDR Broker VM 26.0.35\", \"Cortex XDR Broker VM 26.0.36\", \"Cortex XDR Broker VM 26.0.37\", \"Cortex XDR Broker VM 26.0.38\", \"Cortex XDR Broker VM 26.0.39\", \"Cortex XDR Broker VM 26.0.40\", \"Cortex XDR Broker VM 26.0.41\", \"Cortex XDR Broker VM 26.0.42\", \"Cortex XDR Broker VM 26.0.43\", \"Cortex XDR Broker VM 26.0.44\", \"Cortex XDR Broker VM 26.0.45\", \"Cortex XDR Broker VM 26.0.46\", \"Cortex XDR Broker VM 26.0.47\", \"Cortex XDR Broker VM 26.0.48\", \"Cortex XDR Broker VM 26.0.49\", \"Cortex XDR Broker VM 26.0.50\", \"Cortex XDR Broker VM 26.0.51\", \"Cortex XDR Broker VM 26.0.52\", \"Cortex XDR Broker VM 26.0.53\", \"Cortex XDR Broker VM 26.0.54\", \"Cortex XDR Broker VM 26.0.55\", \"Cortex XDR Broker VM 26.0.56\", \"Cortex XDR Broker VM 26.0.57\", \"Cortex XDR Broker VM 26.0.58\", \"Cortex XDR Broker VM 26.0.59\", \"Cortex XDR Broker VM 26.0.60\", \"Cortex XDR Broker VM 26.0.61\", \"Cortex XDR Broker VM 26.0.62\", \"Cortex XDR Broker VM 26.0.63\", \"Cortex XDR Broker VM 26.0.64\", \"Cortex XDR Broker VM 26.0.65\", \"Cortex XDR Broker VM 26.0.66\", \"Cortex XDR Broker VM 26.0.67\", \"Cortex XDR Broker VM 26.0.68\", \"Cortex XDR Broker VM 26.0.69\", \"Cortex XDR Broker VM 26.0.70\", \"Cortex XDR Broker VM 26.0.71\", \"Cortex XDR Broker VM 26.0.72\", \"Cortex XDR Broker VM 26.0.73\", \"Cortex XDR Broker VM 26.0.74\", \"Cortex XDR Broker VM 26.0.75\", \"Cortex XDR Broker VM 26.0.76\", \"Cortex XDR Broker VM 26.0.77\", \"Cortex XDR Broker VM 26.0.78\", \"Cortex XDR Broker VM 26.0.79\", \"Cortex XDR Broker VM 26.0.80\", \"Cortex XDR Broker VM 26.0.81\", \"Cortex XDR Broker VM 26.0.82\", \"Cortex XDR Broker VM 26.0.83\", \"Cortex XDR Broker VM 26.0.84\", \"Cortex XDR Broker VM 26.0.85\", \"Cortex XDR Broker VM 26.0.86\", \"Cortex XDR Broker VM 26.0.87\", \"Cortex XDR Broker VM 26.0.88\", \"Cortex XDR Broker VM 26.0.89\", \"Cortex XDR Broker VM 26.0.90\", \"Cortex XDR Broker VM 26.0.91\", \"Cortex XDR Broker VM 26.0.92\", \"Cortex XDR Broker VM 26.0.93\", \"Cortex XDR Broker VM 26.0.94\", \"Cortex XDR Broker VM 26.0.95\", \"Cortex XDR Broker VM 26.0.96\", \"Cortex XDR Broker VM 26.0.97\", \"Cortex XDR Broker VM 26.0.98\", \"Cortex XDR Broker VM 26.0.99\", \"Cortex XDR Broker VM 26.0.100\", \"Cortex XDR Broker VM 26.0.101\", \"Cortex XDR Broker VM 26.0.102\", \"Cortex XDR Broker VM 26.0.103\", \"Cortex XDR Broker VM 26.0.104\", \"Cortex XDR Broker VM 26.0.105\", \"Cortex XDR Broker VM 26.0.106\", \"Cortex XDR Broker VM 26.0.107\", \"Cortex XDR Broker VM 26.0.108\", \"Cortex XDR Broker VM 26.0.109\", \"Cortex XDR Broker VM 26.0.110\", \"Cortex XDR Broker VM 26.0.111\", \"Cortex XDR Broker VM 26.0.112\", \"Cortex XDR Broker VM 26.0.113\", \"Cortex XDR Broker VM 26.0.114\", \"Cortex XDR Broker VM 26.0.115\", \"Cortex XDR Broker VM 26.0.116\", \"Cortex XDR Broker VM 26.0.117\", \"Cortex XDR Broker VM 26.0.118\"], \"providerMetadata\": {\"orgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"shortName\": \"palo_alto\", \"dateUpdated\": \"2025-06-12T23:41:37.071Z\"}}}", "cveMetadata": "{\"cveId\": \"CVE-2025-4228\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-06-14T03:56:20.140Z\", \"dateReserved\": \"2025-05-02T19:10:41.205Z\", \"assignerOrgId\": \"d6c1279f-00f6-4ef7-9217-f89ffe703ec0\", \"datePublished\": \"2025-06-12T23:41:37.071Z\", \"assignerShortName\": \"palo_alto\"}", "dataType": "CVE_RECORD", "dataVersion": "5.1" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…