First published: Wed May 11 2022(Updated: )
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts: All versions of the Cortex XDR agent when upgrading to Cortex XDR agent 7.7.0 on Windows; Cortex XDR agent 7.7.0 without content update 500 or a later version on Windows. This issue does not impact other platforms or other versions of the Cortex XDR agent.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Cortex Xdr Agent | >=7.7.0<7.7.1.62043 | |
Microsoft Windows |
This issue is fixed in Cortex XDR agent 7.7.0 with content update 500, Cortex XDR agent 7.7.1 build 7.7.1.62043, and all later Cortex XDR agent versions. Ensure that Cortex XDR agent is upgraded to Cortex XDR agent 7.7.1.62043 or a later build when upgrading Cortex XDR agent to Cortex XDR agent 7.7 to prevent exposure to this vulnerability during the upgrade process.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0025 is a local privilege escalation vulnerability in Palo Alto Networks Cortex XDR agent software on Windows.
Users of Palo Alto Networks Cortex XDR agent software on Windows versions 7.7.0 to 7.7.1.62043 are affected by CVE-2022-0025.
CVE-2022-0025 has a severity rating of 6.7 (high).
CVE-2022-0025 allows an authenticated local user with file creation privilege in the Windows root directory to execute a program with elevated privileges.
To fix CVE-2022-0025, users should update Palo Alto Networks Cortex XDR agent software to a version higher than 7.7.1.62043.