First published: Tue Jun 22 2021(Updated: )
An improper authorization vulnerability in Palo Alto Networks Cortex XSOAR enables a remote unauthenticated attacker with network access to the Cortex XSOAR server to perform unauthorized actions through the REST API. This issue impacts: Cortex XSOAR 6.1.0 builds later than 1016923 and earlier than 1271064; Cortex XSOAR 6.2.0 builds earlier than 1271065. This issue does not impact Cortex XSOAR 5.5.0, Cortex XSOAR 6.0.0, Cortex XSOAR 6.0.1, or Cortex XSOAR 6.0.2 versions. All Cortex XSOAR instances hosted by Palo Alto Networks are upgraded to resolve this vulnerability. No additional action is required for these instances.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Cortex Xsoar | =6.1.0-1016923 | |
Paloaltonetworks Cortex Xsoar | =6.2.0 |
This issue is fixed in Cortex XSOAR 6.1.0 build 1271064, Cortex XSOAR 6.2.0 build 1271065, and all later Cortex XSOAR versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-3044 is an improper authorization vulnerability in Palo Alto Networks Cortex XSOAR, allowing unauthorized actions through the REST API.
CVE-2021-3044 has a severity rating of 9.8 (Critical).
CVE-2021-3044 impacts Palo Alto Networks Cortex XSOAR versions 6.1.0 and 6.2.0.
An attacker with network access to the Cortex XSOAR server can exploit CVE-2021-3044 by performing unauthorized actions through the REST API.
Yes, it is recommended to update to a fixed version of Palo Alto Networks Cortex XSOAR, as mentioned in the security advisory.