CVE-2022-0012 (GCVE-0-2022-0012)
Vulnerability from cvelistv5
Published
2022-01-12 17:30
Modified
2024-09-17 01:55
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Summary
An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
References
► | URL | Tags | |
---|---|---|---|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Palo Alto Networks | Cortex XDR Agent |
Version: 5.0 < 5.0.12 Version: 7.2 < 7.2.4 Version: 7.3 < 7.3.2 Version: 6.1 < 6.1.9 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-02T23:18:41.522Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0012" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "platforms": [ "Windows" ], "product": "Cortex XDR Agent", "vendor": "Palo Alto Networks", "versions": [ { "status": "unaffected", "version": "7.4.*" }, { "status": "unaffected", "version": "7.5.*" }, { "status": "unaffected", "version": "7.6.*" }, { "changes": [ { "at": "5.0.12", "status": "unaffected" } ], "lessThan": "5.0.12", "status": "affected", "version": "5.0", "versionType": "custom" }, { "changes": [ { "at": "7.2.4", "status": "unaffected" } ], "lessThan": "7.2.4", "status": "affected", "version": "7.2", "versionType": "custom" }, { "changes": [ { "at": "7.3.2", "status": "unaffected" } ], "lessThan": "7.3.2", "status": "affected", "version": "7.3", "versionType": "custom" }, { "changes": [ { "at": "6.1.9", "status": "unaffected" } ], "lessThan": "6.1.9", "status": "affected", "version": "6.1", "versionType": "custom" } ] } ], "credits": [ { "lang": "en", "value": "Palo Alto Networks thanks Chris Au for discovering and reporting this issue." } ], "datePublic": "2022-01-12T00:00:00", "descriptions": [ { "lang": "en", "value": "An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." } ], "exploits": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-01-12T17:30:15", "orgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "shortName": "palo_alto" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://security.paloaltonetworks.com/CVE-2022-0012" } ], "solutions": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13408" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "title": "Cortex XDR Agent: Local Arbitrary File Deletion Vulnerability", "workarounds": [ { "lang": "en", "value": "There is no known workaround available for this issue." } ], "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@paloaltonetworks.com", "DATE_PUBLIC": "2022-01-12T17:00:00.000Z", "ID": "CVE-2022-0012", "STATE": "PUBLIC", "TITLE": "Cortex XDR Agent: Local Arbitrary File Deletion Vulnerability" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Cortex XDR Agent", "version": { "version_data": [ { "platform": "Windows", "version_affected": "\u003c", "version_name": "5.0", "version_value": "5.0.12" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "5.0", "version_value": "5.0.12" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.2", "version_value": "7.2.4" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.2", "version_value": "7.2.4" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "7.3", "version_value": "7.3.2" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "7.3", "version_value": "7.3.2" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.4", "version_value": "7.4.*" }, { "platform": "Windows", "version_affected": "\u003c", "version_name": "6.1", "version_value": "6.1.9" }, { "platform": "Windows", "version_affected": "!\u003e=", "version_name": "6.1", "version_value": "6.1.9" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.5", "version_value": "7.5.*" }, { "platform": "Windows", "version_affected": "!", "version_name": "7.6", "version_value": "7.6.*" } ] } } ] }, "vendor_name": "Palo Alto Networks" } ] } }, "credit": [ { "lang": "eng", "value": "Palo Alto Networks thanks Chris Au for discovering and reporting this issue." } ], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2." } ] }, "exploit": [ { "lang": "en", "value": "Palo Alto Networks is not aware of any malicious exploitation of this issue." } ], "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.1, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-59 Improper Link Resolution Before File Access (\u0027Link Following\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://security.paloaltonetworks.com/CVE-2022-0012", "refsource": "MISC", "url": "https://security.paloaltonetworks.com/CVE-2022-0012" } ] }, "solution": [ { "lang": "en", "value": "This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions." } ], "source": { "defect": [ "CPATR-13408" ], "discovery": "EXTERNAL" }, "timeline": [ { "lang": "en", "time": "2022-01-12T00:00:00", "value": "Initial publication" } ], "work_around": [ { "lang": "en", "value": "There is no known workaround available for this issue." } ], "x_advisoryEoL": false, "x_affectedList": [ "Cortex XDR Agent 7.3", "Cortex XDR Agent 7.2", "Cortex XDR Agent 7.1", "Cortex XDR Agent 7.0", "Cortex XDR Agent 6.1", "Cortex XDR Agent 5.0" ] } } }, "cveMetadata": { "assignerOrgId": "d6c1279f-00f6-4ef7-9217-f89ffe703ec0", "assignerShortName": "palo_alto", "cveId": "CVE-2022-0012", "datePublished": "2022-01-12T17:30:15.528091Z", "dateReserved": "2021-12-28T00:00:00", "dateUpdated": "2024-09-17T01:55:48.198Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2022-0012\",\"sourceIdentifier\":\"psirt@paloaltonetworks.com\",\"published\":\"2022-01-12T18:15:08.010\",\"lastModified\":\"2024-11-21T06:37:48.800\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An improper link resolution before file access vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables a local user to delete arbitrary system files and impact the system integrity or cause a denial of service condition. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.\"},{\"lang\":\"es\",\"value\":\"Se presenta una vulnerabilidad de resoluci\u00f3n de enlaces inapropiada antes del acceso a archivos en el agente Cortex XDR de Palo Alto Networks en plataformas Windows que permite a un usuario local eliminar archivos arbitrarios del sistema y afectar a la integridad del sistema o causar una condici\u00f3n de denegaci\u00f3n de servicio. Este problema afecta: Agente Cortex XDR versiones 5.0 anteriores al agente Cortex XDR 5.0.12; Agente Cortex XDR versiones 6.1 anteriores al agente Cortex XDR 6.1.9; Agente Cortex XDR versiones7.2 anteriores al agente Cortex XDR 7.2.4; Agente Cortex XDR versiones7.3 anteriores al agente Cortex XDR 7.3.2\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":4.2},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H\",\"baseScore\":7.1,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.2}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:N/I:P/A:P\",\"baseScore\":3.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"LOW\",\"exploitabilityScore\":3.9,\"impactScore\":4.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"psirt@paloaltonetworks.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-59\"}]}],\"configurations\":[{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"5.0\",\"versionEndExcluding\":\"5.0.12\",\"matchCriteriaId\":\"ACA2B1DA-165F-44A9-B173-F39842438E69\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"6.1\",\"versionEndExcluding\":\"6.1.9\",\"matchCriteriaId\":\"FD9113FA-3169-4D5C-84F6-A3AC4A510347\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.2\",\"versionEndExcluding\":\"7.2.4\",\"matchCriteriaId\":\"D0E24F90-79DD-47F5-BC32-35E32E260BDD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:paloaltonetworks:cortex_xdr_agent:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"7.3\",\"versionEndExcluding\":\"7.3.2\",\"matchCriteriaId\":\"239EDF44-FCDF-45AC-AE50-D57E6FD7539B\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2572D17-1DE6-457B-99CC-64AFD54487EA\"}]}]}],\"references\":[{\"url\":\"https://security.paloaltonetworks.com/CVE-2022-0012\",\"source\":\"psirt@paloaltonetworks.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.paloaltonetworks.com/CVE-2022-0012\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…