An improper authorization vulnerability in Palo Alto Networks Cortex XSOAR enables a remote unauthenticated attacker with network access to the Cortex XSOAR server to perform unauthorized actions through the REST API. This issue impacts: Cortex XSOAR 6.1.0 builds later than 1016923 and earlier than 1271064; Cortex XSOAR 6.2.0 builds earlier than 1271065. This issue does not impact Cortex XSOAR 5.5.0, Cortex XSOAR 6.0.0, Cortex XSOAR 6.0.1, or Cortex XSOAR 6.0.2 versions. All Cortex XSOAR instances hosted by Palo Alto Networks are upgraded to resolve this vulnerability. No additional action is required for these instances.
Fixes

Solution

This issue is fixed in Cortex XSOAR 6.1.0 build 1271064, Cortex XSOAR 6.2.0 build 1271065, and all later Cortex XSOAR versions.


Workaround

You must revoke all active integration API keys to fully mitigate the impact of this issue. To revoke integration API keys from the Cortex XSOAR web client: Settings > Integration > API Keys and then Revoke each API key. You can create new API keys after you upgrade Cortex XSOAR to a fixed version.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: palo_alto

Published:

Updated: 2024-09-16T17:23:37.359Z

Reserved: 2021-01-06T00:00:00

Link: CVE-2021-3044

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-06-22T18:15:08.230

Modified: 2024-11-21T06:20:49.983

Link: CVE-2021-3044

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.