// For flags

CVE-2022-0013

Cortex XDR Agent: File Information Exposure Vulnerability When Generating Support File

Severity Score

5.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

A file information exposure vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker to read the contents of arbitrary files on the system with elevated privileges when generating a support file. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.

Se presenta una vulnerabilidad de exposición de información de archivos en el agente Cortex XDR de Palo Alto Networks que permite a un atacante local leer el contenido de archivos arbitrarios en el sistema con altos privilegios cuando es generado un archivo de soporte. Este problema afecta: Agente Cortex XDR versiones 5.0 anteriores al agente Cortex XDR 5.0.12; Agente Cortex XDR versiones 6.1 anteriores al agente Cortex XDR 6.1.9; Agente Cortex XDR versiones 7.2 anteriores al agente Cortex XDR 7.2.4; Agente Cortex XDR versiones 7.3 anteriores al agente Cortex XDR 7.3.2

*Credits: This issue was found by Robert McCallum of Palo Alto Networks during an internal security review.
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2021-12-28 CVE Reserved
  • 2022-01-12 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
  • CWE-538: Insertion of Sensitive Information into Externally-Accessible File or Directory
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xdr Agent
Search vendor "Paloaltonetworks" for product "Cortex Xdr Agent"
>= 5.0 < 5.0.12
Search vendor "Paloaltonetworks" for product "Cortex Xdr Agent" and version " >= 5.0 < 5.0.12"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xdr Agent
Search vendor "Paloaltonetworks" for product "Cortex Xdr Agent"
>= 6.1 < 6.1.9
Search vendor "Paloaltonetworks" for product "Cortex Xdr Agent" and version " >= 6.1 < 6.1.9"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xdr Agent
Search vendor "Paloaltonetworks" for product "Cortex Xdr Agent"
>= 7.2 < 7.2.4
Search vendor "Paloaltonetworks" for product "Cortex Xdr Agent" and version " >= 7.2 < 7.2.4"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe
Paloaltonetworks
Search vendor "Paloaltonetworks"
Cortex Xdr Agent
Search vendor "Paloaltonetworks" for product "Cortex Xdr Agent"
>= 7.3 < 7.3.2
Search vendor "Paloaltonetworks" for product "Cortex Xdr Agent" and version " >= 7.3 < 7.3.2"
-
Affected
in Microsoft
Search vendor "Microsoft"
Windows
Search vendor "Microsoft" for product "Windows"
--
Safe