{"dataType":"CVE_RECORD","dataVersion":"5.1","cveMetadata":{"cveId":"CVE-2024-5907","assignerOrgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","state":"PUBLISHED","assignerShortName":"palo_alto","dateReserved":"2024-06-12T15:27:55.262Z","datePublished":"2024-06-12T16:26:39.742Z","dateUpdated":"2024-08-01T21:25:03.047Z"},"containers":{"cna":{"affected":[{"defaultStatus":"unaffected","platforms":["Windows"],"product":"Cortex XDR Agent","vendor":"Palo Alto Networks","versions":[{"changes":[{"at":"7.9.102-CE","status":"unaffected"}],"lessThan":"7.9.102-CE","status":"affected","version":"7.9-CE","versionType":"custom"},{"status":"affected","version":"8.1.0"},{"changes":[{"at":"8.2.3","status":"unaffected"}],"lessThan":"8.2.3","status":"affected","version":"8.2.0","versionType":"custom"},{"changes":[{"at":"8.3.1","status":"unaffected"}],"lessThan":"8.3.1","status":"affected","version":"8.3.0","versionType":"custom"},{"status":"unaffected","version":"8.4.0"}]}],"credits":[{"lang":"en","type":"finder","value":"Palo Alto Networks thanks Orange Cyberdefense Switzerland's Research Team for discovering and reporting this issue."}],"datePublic":"2024-06-12T07:00:00.000Z","descriptions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit.</p>"}],"value":"A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit."}],"exploits":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>Palo Alto Networks is not aware of any malicious exploitation of this issue.</p>"}],"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}],"impacts":[{"capecId":"CAPEC-233","descriptions":[{"lang":"en","value":"CAPEC-233 Privilege Escalation"}]}],"metrics":[{"cvssV4_0":{"Automatable":"NO","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":5.2,"baseSeverity":"MEDIUM","privilegesRequired":"LOW","providerUrgency":"AMBER","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"MODERATE"},"format":"CVSS","scenarios":[{"lang":"en","value":"GENERAL"}]}],"problemTypes":[{"descriptions":[{"cweId":"CWE-269","description":"CWE-269 Improper Privilege Management","lang":"en","type":"CWE"}]}],"providerMetadata":{"orgId":"d6c1279f-00f6-4ef7-9217-f89ffe703ec0","shortName":"palo_alto","dateUpdated":"2024-06-12T16:26:39.742Z"},"references":[{"tags":["vendor-advisory"],"url":"https://security.paloaltonetworks.com/CVE-2024-5907"}],"solutions":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"<p>This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024.</p>"}],"value":"This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024."}],"source":{"defect":["CPATR-23348"],"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-06-12T16:00:00.000Z","value":"Initial publication"}],"title":"Cortex XDR Agent: Local Privilege Escalation (PE) Vulnerability","x_generator":{"engine":"vulnogram 0.1.0-rc1"},"x_legacyV4Record":{"CNA_private":{"Current-Status":"Verify with Alain how they want to be acknowledged","Priority":"normal","STATE":"review","TYPE":"advisory","affectsSummary":{"affected":["None","< 8.3.1 on Windows","< 8.2.3 on Windows","All","< 7.9.102-CE on Windows"],"appliesTo":["Cortex XDR Agent 8.4","Cortex XDR Agent 8.3","Cortex XDR Agent 8.2","Cortex XDR Agent 8.1","Cortex XDR Agent 7.9-CE"],"product_versions":["Cortex XDR Agent 8.4","Cortex XDR Agent 8.3","Cortex XDR Agent 8.2","Cortex XDR Agent 8.1","Cortex XDR Agent 7.9-CE"],"unaffected":["All",">= 8.3.1 on Windows",">= 8.2.3 on Windows","None",">= 7.9.102-CE on Windows"],"unknown":["","","","",""]},"owner":"abaishya","publish":{"month":"06","year":"2024","ym":"2024-06"},"share_with_CVE":true,"show_cvss":true},"CVE_data_meta":{"ASSIGNER":"psirt@paloaltonetworks.com","DATE_PUBLIC":"2024-06-12T16:00:00.000Z","ID":"CVE-2023-case-CPATR-23348","STATE":"PUBLIC","TITLE":"Cortex XDR Agent: Local Privilege Escalation (PE) Vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"Cortex XDR Agent","version":{"version_data":[{"platform":"Windows","version_affected":"<","version_name":"7.9-CE","version_value":"7.9.102-CE"},{"platform":"Windows","version_affected":"!>=","version_name":"7.9-CE","version_value":"7.9.102-CE"},{"platform":"Windows","version_affected":"<","version_name":"8.2","version_value":"8.2.3"},{"platform":"Windows","version_affected":"!>=","version_name":"8.2","version_value":"8.2.3"},{"platform":"Windows","version_affected":"<","version_name":"8.3","version_value":"8.3.1"},{"platform":"Windows","version_affected":"!>=","version_name":"8.3","version_value":"8.3.1"},{"version_affected":"=","version_name":"8.4","version_value":"None"},{"version_affected":"!","version_name":"8.4","version_value":"All"},{"version_affected":"=","version_name":"8.1","version_value":"All"},{"version_affected":"!","version_name":"8.1","version_value":"None"}]}}]},"vendor_name":"Palo Alto Networks"}]}},"credit":[{"lang":"eng","value":"Palo Alto Networks thanks Alain Mowat of Orange Cyberdefense for discovering and reporting this issue."}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"A privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XDR agent on Windows devices enables a local user to execute programs with elevated privileges. However, execution does require the local user to successfully exploit a race condition, which makes this vulnerability difficult to exploit."}]},"exploit":[{"lang":"en","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue."}],"generator":{"engine":"vulnogram 0.1.0-rc1"},"impact":{"cvss":{"Automatable":"NO","Recovery":"USER","Safety":"NOT_DEFINED","attackComplexity":"HIGH","attackRequirements":"NONE","attackVector":"LOCAL","baseScore":5.2,"baseSeverity":"MEDIUM","privilegesRequired":"LOW","providerUrgency":"AMBER","subAvailabilityImpact":"HIGH","subConfidentialityImpact":"HIGH","subIntegrityImpact":"HIGH","userInteraction":"NONE","valueDensity":"DIFFUSE","vectorString":"CVSS:4.0/AV:L/AC:H/AT:N/PR:L/UI:N/VC:N/VI:L/VA:N/SC:H/SI:H/SA:H/AU:N/R:U/V:D/RE:M/U:Amber","version":"4.0","vulnAvailabilityImpact":"NONE","vulnConfidentialityImpact":"NONE","vulnIntegrityImpact":"LOW","vulnerabilityResponseEffort":"MODERATE"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-269 Improper Privilege Management"}]}]},"references":{"reference_data":[{"refsource":"CONFIRM","url":"https://security.paloaltonetworks.com/CVE-2023-case-CPATR-23348"}]},"solution":[{"lang":"en","value":"This issue is fixed in Cortex XDR agent 7.9.102-CE, Cortex XDR agent 8.2.3, Cortex XDR agent 8.3.1, and all later Cortex XDR agent versions. This issue will not be addressed in Cortex XDR agent 8.1, which reached end-of-life (EoL) status on April 9, 2024."}],"source":{"defect":["CPATR-23348"],"discovery":"EXTERNAL"},"timeline":[{"lang":"en","time":"2024-06-12T00:00:00.000Z","value":"Initial publication"}],"x_advisoryEoL":false}},"adp":[{"metrics":[{"other":{"type":"ssvc","content":{"timestamp":"2023-11-08T00:00:00+00:00","options":[{"Exploitation":"none"},{"Automatable":"no"},{"Technical Impact":"total"}],"role":"CISA Coordinator","version":"2.0.3","id":"CVE-2024-5907"}}}],"title":"CISA ADP Vulnrichment","providerMetadata":{"orgId":"134c704f-9b21-4f2e-91b3-4a467353bcc0","shortName":"CISA-ADP","dateUpdated":"2024-06-14T03:56:05.821Z"}},{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-01T21:25:03.047Z"},"title":"CVE Program Container","references":[{"tags":["vendor-advisory","x_transferred"],"url":"https://security.paloaltonetworks.com/CVE-2024-5907"}]}]}}