First published: Wed Nov 08 2023(Updated: )
A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system enables a local attacker to execute programs with elevated privileges if the attacker has shell access to the engine.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Paloaltonetworks Cortex Xsoar | <6.10.0 | |
Linux Linux kernel |
This issue is fixed in deployed Cortex XSOAR engines when an updated engine installer is created and used to upgrade the engine from Cortex XSOAR 6.10 build B250144 and all later builds of Cortex XSOAR.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-3282 is a local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system.
CVE-2023-3282 allows a local attacker with shell access to the Cortex XSOAR engine to execute programs with elevated privileges.
CVE-2023-3282 has a severity rating of 6.4, which is considered medium.
To mitigate CVE-2023-3282, it is recommended to update the Palo Alto Networks Cortex XSOAR engine software to version 6.10.1 or later.
For more information about CVE-2023-3282, you can visit the Palo Alto Networks security advisory at https://security.paloaltonetworks.com/CVE-2023-3282.