CVE-2022-0026 (GCVE-0-2022-0026)

Vulnerability from cvelistv5 – Published: 2022-05-11 16:30 – Updated: 2024-09-17 01:26
VLAI?
Summary
A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.
CWE
  • CWE-282 - Improper Ownership Management
Assigner
References
Impacted products
Vendor Product Version
Palo Alto Networks Cortex XDR Agent Affected: 7.7.* without CU-330
Unaffected: 7.7.* with CU-330
Affected: 7.6.* without CU-330
Unaffected: 7.6.* with CU-330
Affected: 7.5 CE 7.5.* without CU-330
Unaffected: 7.5 CE 7.5.* with CU-330
Affected: 7.4.* without CU-330
Unaffected: 7.4.* with CU-330
Affected: 6.1.* without CU-330
Unaffected: 6.1.* with CU-330
Affected: 7.5.* without CU-330
Unaffected: 7.5.* with CU-330
Create a notification for this product.
Credits
Palo Alto Networks thanks Xavier DANEST of Decathlon and Yasser Alhazmi for discovering and reporting this issue.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T23:18:41.652Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://security.paloaltonetworks.com/CVE-2022-0026"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "platforms": [
            "Windows"
          ],
          "product": "Cortex XDR Agent",
          "vendor": "Palo Alto Networks",
          "versions": [
            {
              "status": "affected",
              "version": "7.7.* without CU-330"
            },
            {
              "status": "unaffected",
              "version": "7.7.* with CU-330"
            },
            {
              "status": "affected",
              "version": "7.6.* without CU-330"
            },
            {
              "status": "unaffected",
              "version": "7.6.* with CU-330"
            },
            {
              "status": "affected",
              "version": "7.5 CE 7.5.* without CU-330"
            },
            {
              "status": "unaffected",
              "version": "7.5 CE 7.5.* with CU-330"
            },
            {
              "status": "affected",
              "version": "7.4.* without CU-330"
            },
            {
              "status": "unaffected",
              "version": "7.4.* with CU-330"
            },
            {
              "status": "affected",
              "version": "6.1.* without CU-330"
            },
            {
              "status": "unaffected",
              "version": "6.1.* with CU-330"
            },
            {
              "status": "affected",
              "version": "7.5.* without CU-330"
            },
            {
              "status": "unaffected",
              "version": "7.5.* with CU-330"
            }
          ]
        }
      ],
      "credits": [
        {
          "lang": "en",
          "value": "Palo Alto Networks thanks Xavier DANEST of Decathlon and Yasser Alhazmi for discovering and reporting this issue."
        }
      ],
      "datePublic": "2022-05-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version."
        }
      ],
      "exploits": [
        {
          "lang": "en",
          "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-282",
              "description": "CWE-282 Improper Ownership Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-05-11T16:30:25",
        "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
        "shortName": "palo_alto"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://security.paloaltonetworks.com/CVE-2022-0026"
        }
      ],
      "solutions": [
        {
          "lang": "en",
          "value": "This issue is fixed in all Cortex XDR agent versions with content update 330 and later content update versions."
        }
      ],
      "source": {
        "defect": [
          "CPATR-13696",
          "CPATR-13873"
        ],
        "discovery": "EXTERNAL"
      },
      "timeline": [
        {
          "lang": "en",
          "time": "2022-05-11T00:00:00",
          "value": "Initial publication"
        }
      ],
      "title": "Cortex XDR Agent: Unintended Program Execution Leads to Local Privilege Escalation (PE) Vulnerability",
      "workarounds": [
        {
          "lang": "en",
          "value": "There are no known workarounds for this issue."
        }
      ],
      "x_generator": {
        "engine": "Vulnogram 0.0.9"
      },
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "psirt@paloaltonetworks.com",
          "DATE_PUBLIC": "2022-05-11T16:00:00.000Z",
          "ID": "CVE-2022-0026",
          "STATE": "PUBLIC",
          "TITLE": "Cortex XDR Agent: Unintended Program Execution Leads to Local Privilege Escalation (PE) Vulnerability"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "Cortex XDR Agent",
                      "version": {
                        "version_data": [
                          {
                            "platform": "Windows",
                            "version_affected": "=",
                            "version_name": "7.7",
                            "version_value": "7.7.* without CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "!",
                            "version_name": "7.7",
                            "version_value": "7.7.* with CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "=",
                            "version_name": "7.6",
                            "version_value": "7.6.* without CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "!",
                            "version_name": "7.6",
                            "version_value": "7.6.* with CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "=",
                            "version_name": "7.5 CE",
                            "version_value": "7.5.* without CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "!",
                            "version_name": "7.5 CE",
                            "version_value": "7.5.* with CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "=",
                            "version_name": "7.4",
                            "version_value": "7.4.* without CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "!",
                            "version_name": "7.4",
                            "version_value": "7.4.* with CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "=",
                            "version_name": "6.1",
                            "version_value": "6.1.* without CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "!",
                            "version_name": "6.1",
                            "version_value": "6.1.* with CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "=",
                            "version_name": "7.5",
                            "version_value": "7.5.* without CU-330"
                          },
                          {
                            "platform": "Windows",
                            "version_affected": "!",
                            "version_name": "7.5",
                            "version_value": "7.5.* with CU-330"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "Palo Alto Networks"
              }
            ]
          }
        },
        "credit": [
          {
            "lang": "eng",
            "value": "Palo Alto Networks thanks Xavier DANEST of Decathlon and Yasser Alhazmi for discovering and reporting this issue."
          }
        ],
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version."
            }
          ]
        },
        "exploit": [
          {
            "lang": "en",
            "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue."
          }
        ],
        "generator": {
          "engine": "Vulnogram 0.0.9"
        },
        "impact": {
          "cvss": {
            "attackComplexity": "LOW",
            "attackVector": "LOCAL",
            "availabilityImpact": "HIGH",
            "baseScore": 6.7,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "HIGH",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          }
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "CWE-282 Improper Ownership Management"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://security.paloaltonetworks.com/CVE-2022-0026",
              "refsource": "MISC",
              "url": "https://security.paloaltonetworks.com/CVE-2022-0026"
            }
          ]
        },
        "solution": [
          {
            "lang": "en",
            "value": "This issue is fixed in all Cortex XDR agent versions with content update 330 and later content update versions."
          }
        ],
        "source": {
          "defect": [
            "CPATR-13696",
            "CPATR-13873"
          ],
          "discovery": "EXTERNAL"
        },
        "timeline": [
          {
            "lang": "en",
            "time": "2022-05-11T00:00:00",
            "value": "Initial publication"
          }
        ],
        "work_around": [
          {
            "lang": "en",
            "value": "There are no known workarounds for this issue."
          }
        ],
        "x_advisoryEoL": false,
        "x_affectedList": [
          "Cortex XDR Agent 7.7",
          "Cortex XDR Agent 7.6",
          "Cortex XDR Agent 7.5",
          "Cortex XDR Agent 7.4",
          "Cortex XDR Agent 7.5 CE",
          "Cortex XDR Agent 6.1"
        ]
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0",
    "assignerShortName": "palo_alto",
    "cveId": "CVE-2022-0026",
    "datePublished": "2022-05-11T16:30:25.746724Z",
    "dateReserved": "2021-12-28T00:00:00",
    "dateUpdated": "2024-09-17T01:26:10.764Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"operator\": \"AND\", \"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"8535E8E2-188C-460B-86A8-F463854F5DFE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"09A12884-47E6-451E-9751-F871F12692E7\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.4:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"6F522F4D-8740-41C2-A662-2D3FADB98ADB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.4:hotfix:*:*:*:*:*:*\", \"matchCriteriaId\": \"559A6865-F8E3-4F6B-A53B-5EA48C5B9120\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B027DB3-7A70-443B-B5F4-B66A3BCCF2A6\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"7103C435-D4CC-46BE-8487-03ADF0135792\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:hotfix:*:*:*:*:*:*\", \"matchCriteriaId\": \"14B92689-A030-44F3-9B66-2E003198A407\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.6:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"920FAB2B-4AEC-48FD-9744-617BC6C494CA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.6:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F81B9E1-E1A1-4910-AE0C-65BC8F554A47\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.7:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"2BECB228-650F-448A-931D-DFA7D097E41E\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.7:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"1FC042EE-8F41-466C-9D85-556092102EE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.8:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"30B091F7-AE11-4540-A945-7100ACE812AC\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.8:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F880FD5-FCC6-4FEE-AB48-088C9C431E64\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.9:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"6792CE52-83C7-4601-B9E5-54FF77103DB0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.9:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"600E93EA-21E5-41F1-977A-43F0513C2468\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"5257930C-27F0-4A1E-B5C9-D3D76C27715D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.1:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"0C01C824-2578-4C11-9578-731B597BECB1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA4B14D7-5E03-4635-9D75-CEEF0D913EFA\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.2:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"737275AC-C43D-4636-AE0E-BB24A192C525\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"799B0C1C-8963-4A04-A3A2-E1D97C6BE467\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.3:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1221A81-E602-4629-93B8-3ABCA7C1F6C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.4:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"210954DD-8719-4212-8725-3201EF7AF9D1\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.4:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"603A11D1-B95D-48E2-B61C-012B3675D4B7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5:-:*:*:content_engine:*:*:*\", \"matchCriteriaId\": \"B6E273B6-A3A4-47EF-9E37-B123B61ECE23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"716232DD-F8C1-43A3-870A-A6C19D7A4416\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.1:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"8E023342-504F-4DF4-8D2F-F824DE72757D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"D63504E2-E27A-4714-AB1C-CC67675E47E0\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.2:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"5399BD2D-B6F0-4368-BBAA-D25C3A5B7BAA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.3:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"D8D5A99A-BB66-4C4D-BFAB-5B07B0A98BAD\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.3:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"42502AD9-5F5E-441C-B32D-FAEDA4D2BBF9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"B5D4BBBE-57DE-438A-97B3-29C59EA8C48D\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.1:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"13CBA514-D865-4C9F-A2FE-D2FA3B289DC5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.2:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"1E4BCC91-31AB-4318-8A1F-D043392F09E2\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.2:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E421078-40E0-4D3D-A6A3-825EF9452E99\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"EEDE5C5B-48F9-4211-9F98-085C3C5E19FE\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"A9D89CF1-E2F8-4498-859F-D6FB4F9DC82B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2927A74-24A5-459B-9D61-2718643F3338\"}, {\"vulnerable\": false, \"criteria\": \"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7.1:content_update330:*:*:*:*:*:*\", \"matchCriteriaId\": \"483211AE-3205-4DCD-B602-EE707684C464\"}]}, {\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": false, \"criteria\": \"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.\"}, {\"lang\": \"es\", \"value\": \"Se presenta una vulnerabilidad de escalada de privilegios (PE) local en el software Cortex XDR agent de Palo Alto Networks en Windows que permite a un usuario local autenticado con privilegios de creaci\\u00f3n de archivos en el directorio root de Windows (como C:\\\\) ejecutar un programa con altos privilegios. Este problema afecta a todas las versiones de Cortex XDR agent sin la actualizaci\\u00f3n de contenido 330 o una versi\\u00f3n posterior de actualizaci\\u00f3n de contenido\"}]",
      "id": "CVE-2022-0026",
      "lastModified": "2024-11-21T06:37:50.823",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"psirt@paloaltonetworks.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:C/I:C/A:C\", \"baseScore\": 7.2, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"COMPLETE\", \"integrityImpact\": \"COMPLETE\", \"availabilityImpact\": \"COMPLETE\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 3.9, \"impactScore\": 10.0, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2022-05-11T17:15:09.287",
      "references": "[{\"url\": \"https://security.paloaltonetworks.com/CVE-2022-0026\", \"source\": \"psirt@paloaltonetworks.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.paloaltonetworks.com/CVE-2022-0026\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "psirt@paloaltonetworks.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"psirt@paloaltonetworks.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-282\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2022-0026\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2022-05-11T17:15:09.287\",\"lastModified\":\"2024-11-21T06:37:50.823\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A local privilege escalation (PE) vulnerability exists in Palo Alto Networks Cortex XDR agent software on Windows that enables an authenticated local user with file creation privilege in the Windows root directory (such as C:\\\\) to execute a program with elevated privileges. This issue impacts all versions of Cortex XDR agent without content update 330 or a later content update version.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de escalada de privilegios (PE) local en el software Cortex XDR agent de Palo Alto Networks en Windows que permite a un usuario local autenticado con privilegios de creaci\u00f3n de archivos en el directorio root de Windows (como C:\\\\) ejecutar un programa con altos privilegios. Este problema afecta a todas las versiones de Cortex XDR agent sin la actualizaci\u00f3n de contenido 330 o una versi\u00f3n posterior de actualizaci\u00f3n de contenido\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-282\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"8535E8E2-188C-460B-86A8-F463854F5DFE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"09A12884-47E6-451E-9751-F871F12692E7\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.4:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F522F4D-8740-41C2-A662-2D3FADB98ADB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.4:hotfix:*:*:*:*:*:*\",\"matchCriteriaId\":\"559A6865-F8E3-4F6B-A53B-5EA48C5B9120\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B027DB3-7A70-443B-B5F4-B66A3BCCF2A6\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"7103C435-D4CC-46BE-8487-03ADF0135792\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.5:hotfix:*:*:*:*:*:*\",\"matchCriteriaId\":\"14B92689-A030-44F3-9B66-2E003198A407\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.6:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"920FAB2B-4AEC-48FD-9744-617BC6C494CA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.6:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F81B9E1-E1A1-4910-AE0C-65BC8F554A47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"2BECB228-650F-448A-931D-DFA7D097E41E\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.7:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"1FC042EE-8F41-466C-9D85-556092102EE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B091F7-AE11-4540-A945-7100ACE812AC\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.8:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F880FD5-FCC6-4FEE-AB48-088C9C431E64\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.9:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6792CE52-83C7-4601-B9E5-54FF77103DB0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:6.1.9:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"600E93EA-21E5-41F1-977A-43F0513C2468\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5257930C-27F0-4A1E-B5C9-D3D76C27715D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.1:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"0C01C824-2578-4C11-9578-731B597BECB1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA4B14D7-5E03-4635-9D75-CEEF0D913EFA\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.2:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"737275AC-C43D-4636-AE0E-BB24A192C525\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"799B0C1C-8963-4A04-A3A2-E1D97C6BE467\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.3:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1221A81-E602-4629-93B8-3ABCA7C1F6C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.4:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"210954DD-8719-4212-8725-3201EF7AF9D1\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.4.4:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"603A11D1-B95D-48E2-B61C-012B3675D4B7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5:-:*:*:content_engine:*:*:*\",\"matchCriteriaId\":\"B6E273B6-A3A4-47EF-9E37-B123B61ECE23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"716232DD-F8C1-43A3-870A-A6C19D7A4416\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.1:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"8E023342-504F-4DF4-8D2F-F824DE72757D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D63504E2-E27A-4714-AB1C-CC67675E47E0\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.2:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"5399BD2D-B6F0-4368-BBAA-D25C3A5B7BAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.3:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"D8D5A99A-BB66-4C4D-BFAB-5B07B0A98BAD\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.5.3:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"42502AD9-5F5E-441C-B32D-FAEDA4D2BBF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5D4BBBE-57DE-438A-97B3-29C59EA8C48D\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.1:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"13CBA514-D865-4C9F-A2FE-D2FA3B289DC5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.2:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4BCC91-31AB-4318-8A1F-D043392F09E2\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.6.2:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E421078-40E0-4D3D-A6A3-825EF9452E99\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"EEDE5C5B-48F9-4211-9F98-085C3C5E19FE\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9D89CF1-E2F8-4498-859F-D6FB4F9DC82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2927A74-24A5-459B-9D61-2718643F3338\"},{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:7.7.1:content_update330:*:*:*:*:*:*\",\"matchCriteriaId\":\"483211AE-3205-4DCD-B602-EE707684C464\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://security.paloaltonetworks.com/CVE-2022-0026\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2022-0026\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…