First published: Wed Apr 09 2025(Updated: )
A command injection vulnerability in the Palo Alto Networks Cortex XDR® Broker VM allows an authenticated user to execute arbitrary OS commands with root privileges on the host operating system running Broker VM.
Credit: psirt@paloaltonetworks.com
Affected Software | Affected Version | How to fix |
---|---|---|
Cortex XDR | <26.100.3= | 26.100.3 |
There are no known workarounds or mitigations for this issue.
This issue is fixed in Broker VM 26.100.3 and all later Broker VM versions. If you enabled automatic upgrades for Broker VM, then no action is required at this time. If you did not enable automatic upgrades, then we recommend that you do so for Broker VM to ensure that you always have the latest security patches installed in your software.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2025-0119 is classified as a high severity command injection vulnerability.
To mitigate CVE-2025-0119, apply the latest security patch provided by Palo Alto Networks for Cortex XDR Broker VM.
CVE-2025-0119 affects users of Palo Alto Networks Cortex XDR Broker VM versions prior to 26.100.3.
CVE-2025-0119 enables authenticated users to execute arbitrary OS commands with root privileges.
CVE-2025-0119 requires authenticated access to exploit, therefore it is not a remote exploitation vulnerability.