Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-26396 | An improper authorization vulnerability in Palo Alto Networks Cortex XSOAR enables a remote unauthenticated attacker with network access to the Cortex XSOAR server to perform unauthorized actions through the REST API. This issue impacts: Cortex XSOAR 6.1.0 builds later than 1016923 and earlier than 1271064; Cortex XSOAR 6.2.0 builds earlier than 1271065. This issue does not impact Cortex XSOAR 5.5.0, Cortex XSOAR 6.0.0, Cortex XSOAR 6.0.1, or Cortex XSOAR 6.0.2 versions. All Cortex XSOAR instances hosted by Palo Alto Networks are upgraded to resolve this vulnerability. No additional action is required for these instances. |
Solution
This issue is fixed in Cortex XSOAR 6.1.0 build 1271064, Cortex XSOAR 6.2.0 build 1271065, and all later Cortex XSOAR versions.
Workaround
You must revoke all active integration API keys to fully mitigate the impact of this issue. To revoke integration API keys from the Cortex XSOAR web client: Settings > Integration > API Keys and then Revoke each API key. You can create new API keys after you upgrade Cortex XSOAR to a fixed version.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2021-3044 |
|
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-16T17:23:37.359Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-3044
No data.
Status : Modified
Published: 2021-06-22T18:15:08.230
Modified: 2024-11-21T06:20:49.983
Link: CVE-2021-3044
No data.
OpenCVE Enrichment
No data.
EUVD