Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-26403 | An improper verification of cryptographic signature vulnerability exists in Cortex XSOAR SAML authentication that enables an unauthenticated network-based attacker with specific knowledge of the Cortex XSOAR instance to access protected resources and perform unauthorized actions on the Cortex XSOAR server. This issue impacts: Cortex XSOAR 5.5.0 builds earlier than 1578677; Cortex XSOAR 6.0.2 builds earlier than 1576452; Cortex XSOAR 6.1.0 builds earlier than 1578663; Cortex XSOAR 6.2.0 builds earlier than 1578666. All Cortex XSOAR instances hosted by Palo Alto Networks are protected from this vulnerability; no additional action is required for these instances. |
Solution
This issue is fixed in Cortex XSOAR 5.5.0 build 1578677, Cortex XSOAR 6.0.2 build 1576452, Cortex XSOAR 6.1.0 build 1578663, Cortex XSOAR 6.2.0 build 1578666, and all later Cortex XSOAR versions.
Workaround
To completely prevent this issue from being exploited before you can upgrade your Cortex XSOAR server, disable SAML authentication integration. You can also restrict network access to the Cortex XSOAR server to allow only trusted users to further reduce the impact of this issue.
| Link | Providers |
|---|---|
| https://security.paloaltonetworks.com/CVE-2021-3051 |
|
No history.
Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-17T01:10:46.128Z
Reserved: 2021-01-06T00:00:00
Link: CVE-2021-3051
No data.
Status : Modified
Published: 2021-09-08T17:15:11.777
Modified: 2024-11-21T06:20:51.157
Link: CVE-2021-3051
No data.
OpenCVE Enrichment
No data.
EUVD