First published: Wed Jan 12 2022(Updated: )
A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Cortex Xdr Agent | >=5.0<5.0.12 | |
Paloaltonetworks Cortex Xdr Agent | >=6.1<6.1.9 | |
Paloaltonetworks Cortex Xdr Agent | >=7.2<7.2.4 | |
Paloaltonetworks Cortex Xdr Agent | >=7.3<7.3.2 | |
Microsoft Windows |
This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0013 is a file information exposure vulnerability in the Palo Alto Networks Cortex XDR agent that allows a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file.
Cortex XDR agent 5.0 versions earlier than 5.0.12, Cortex XDR agent 6.1 versions earlier than 6.1.9, Cortex XDR agent 7.2 versions earlier than 7.2.4, and Cortex XDR agent 7.3 versions earlier than 7.3.2 are affected by CVE-2022-0013.
CVE-2022-0013 has a severity rating of 5.5, which is considered medium.
CVE-2022-0013 is associated with CWE-200 and CWE-538.
More information about CVE-2022-0013 can be found at https://security.paloaltonetworks.com/CVE-2022-0013.