An untrusted search path vulnerability exists in the Palo Alto Networks Cortex XDR agent that enables a local attacker with file creation privilege in the Windows root directory (such as C:\) to store a program that can then be unintentionally executed by another local user when that user utilizes a Live Terminal session. This issue impacts: Cortex XDR agent 5.0 versions earlier than Cortex XDR agent 5.0.12; Cortex XDR agent 6.1 versions earlier than Cortex XDR agent 6.1.9; Cortex XDR agent 7.2 versions earlier than Cortex XDR agent 7.2.4; Cortex XDR agent 7.3 versions earlier than Cortex XDR agent 7.3.2.
Metrics
Affected Vendors & Products
Fixes
Solution
This issue is fixed in Cortex XDR agent 5.0.12, Cortex XDR agent 6.1.9, Cortex XDR agent 7.2.4, Cortex XDR agent 7.3.2, and all later Cortex XDR agent versions.
Workaround
There are no known workarounds for this issue.
References
Link | Providers |
---|---|
https://security.paloaltonetworks.com/CVE-2022-0014 |
![]() ![]() |
History
No history.

Status: PUBLISHED
Assigner: palo_alto
Published:
Updated: 2024-09-16T23:00:50.618Z
Reserved: 2021-12-28T00:00:00
Link: CVE-2022-0014

No data.

Status : Modified
Published: 2022-01-12T18:15:08.133
Modified: 2024-11-21T06:37:49.090
Link: CVE-2022-0014

No data.

No data.