Vulnerability identifier: #VU104027
Vulnerability risk: High
CVSSv4.0: 6.7 [CVSS:4.0/AV:N/AC:L/AT:N/PR:N/UI:N/VC:H/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Amber]
CVE-ID:
CWE-ID:
CWE-424
Exploitation vector: Network
Exploit availability: No
Vulnerable software:
Cortex XDR Broker VM
Server applications /
IDS/IPS systems, Firewalls and proxy servers
Vendor: Palo Alto Networks, Inc.
Description
The vulnerability allows a remote attacker to gain unauthorized access to VM docker containers.
The vulnerability exists due to an error within the network isolation mechanism. A remote non-authenticated attacker can gain unauthorized access to Docker containers from the host network used by Broker VM and read files sent for analysis and logs transmitted by the Cortex XDR Agent to the Cortex XDR server.
Mitigation
Install updates from vendor's website.
Vulnerable software versions
Cortex XDR Broker VM: 14.3.3 - 25.105.6
External links
https://security.paloaltonetworks.com/CVE-2024-0113
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.