First published: Thu Jun 10 2021(Updated: )
A local privilege escalation vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. This requires the user to have the privilege to create files in the Windows root directory or to manipulate key registry values. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.11; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.8; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.3; All versions of Cortex XDR agent 7.2 without content update release 171 or a later version.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Cortex Xdr Agent | >=5.0<5.0.11 | |
Paloaltonetworks Cortex Xdr Agent | >=6.1<6.1.8 | |
Paloaltonetworks Cortex Xdr Agent | >=7.2<7.2.3 | |
Microsoft Windows |
This issue is fixed in Cortex XDR agent 5.0.11, Cortex XDR agent 6.1.8, Cortex XDR agent 7.2.3, and all later Cortex XDR agent versions. Content updates are required to resolve this issue and are automatically applied for the agent.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3041 is a local privilege escalation vulnerability in the Palo Alto Networks Cortex XDR agent on Windows platforms.
CVE-2021-3041 allows an authenticated local Windows user to execute programs with SYSTEM privileges by creating files in the Windows root directory.
CVE-2021-3041 has a severity rating of 7.8 out of 10 (high).
Versions 5.0 to 5.0.11, 6.1 to 6.1.8, and 7.2 to 7.2.3 of the Palo Alto Networks Cortex XDR agent on Windows platforms are affected by CVE-2021-3041.
To fix CVE-2021-3041, update the Palo Alto Networks Cortex XDR agent to a version that is not vulnerable.