First published: Wed Nov 09 2022(Updated: )
A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system allows a local attacker with shell access to the engine to execute programs with elevated privileges.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Cortex Xsoar | =6.5.0-2102531 | |
Paloaltonetworks Cortex Xsoar | =6.5.0-2410815 | |
Paloaltonetworks Cortex Xsoar | =6.5.0-2583817 | |
Paloaltonetworks Cortex Xsoar | =6.6.0-2585049 | |
Paloaltonetworks Cortex Xsoar | =6.6.0-2889656 | |
Paloaltonetworks Cortex Xsoar | =6.6.0-3049220 | |
Paloaltonetworks Cortex Xsoar | =6.6.0-3124193 | |
Paloaltonetworks Cortex Xsoar | =6.8.0-3261002 | |
Linux Linux kernel |
This issue is fixed in Cortex XSOAR engine software available in Cortex XSOAR 6.9.0 build 130766 and all later versions of Cortex XSOAR.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-0031 is a local privilege escalation vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system.
CVE-2022-0031 allows a local attacker with shell access to the engine to execute programs with elevated privileges, potentially leading to unauthorized actions on the system.
Palo Alto Networks Cortex XSOAR versions 6.5.0-2102531, 6.5.0-2410815, 6.5.0-2583817, 6.6.0-2585049, 6.6.0-2889656, 6.6.0-3049220, 6.6.0-3124193, and 6.8.0-3261002 are affected by CVE-2022-0031.
CVE-2022-0031 has a severity rating of 6.7 (medium).
No, the Linux operating system itself is not vulnerable to CVE-2022-0031.