Palo Alto Networks Cortex XSOAR 6.2.0 1473927

CPE Details

Palo Alto Networks Cortex XSOAR 6.2.0 1473927
6.2.0
2021-09-15
11h07 +00:00
2021-09-15
12h03 +00:00
Alerte pour un CPE
Stay informed of any changes for a specific CPE.
Notifications manage

CPE Name: cpe:2.3:a:paloaltonetworks:cortex_xsoar:6.2.0:1473927:*:*:*:*:*:*

Informations

Vendor

paloaltonetworks

Product

cortex_xsoar

Version

6.2.0

Update

1473927

Related CVE

Open and find in CVE List

CVE ID Published Description Score Severity
CVE-2023-3282 2023-11-08 17h22 +00:00 A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system enables a local attacker to execute programs with elevated privileges if the attacker has shell access to the engine.
6.7
Medium
CVE-2022-0020 2022-02-10 18h10 +00:00 A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations. This issue impacts: All builds of Cortex XSOAR 6.1.0; Cortex XSOAR 6.2.0 builds earlier than build 1958888.
6.8
Medium
CVE-2021-3051 2021-09-08 17h10 +00:00 An improper verification of cryptographic signature vulnerability exists in Cortex XSOAR SAML authentication that enables an unauthenticated network-based attacker with specific knowledge of the Cortex XSOAR instance to access protected resources and perform unauthorized actions on the Cortex XSOAR server. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 1578677; Cortex XSOAR 6.0.2 builds earlier than 1576452; Cortex XSOAR 6.1.0 builds earlier than 1578663; Cortex XSOAR 6.2.0 builds earlier than 1578666. All Cortex XSOAR instances hosted by Palo Alto Networks are protected from this vulnerability; no additional action is required for these instances.
8.1
High