CVE-2021-3042
Summary
| CVE | CVE-2021-3042 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-07-15 17:15:00 UTC |
| Updated | 2021-07-27 14:56:00 UTC |
| Description | A local privilege escalation (PE) vulnerability exists in the Palo Alto Networks Cortex XDR agent on Windows platforms that enables an authenticated local Windows user to execute programs with SYSTEM privileges. Exploiting this vulnerability requires the user to have file creation privilege in the Windows root directory (such as C:\). This issue impacts: All versions of Cortex XDR agent 6.1 without content update 181 or a later version; All versions of Cortex XDR agent 7.2 without content update 181 or a later version; All versions of Cortex XDR agent 7.3 without content update 181 or a later version. Cortex XDR agent 5.0 versions are not impacted by this issue. Content updates are required to resolve this issue and are automatically applied for the agent. |
Risk And Classification
Problem Types: CWE-427
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Operating System | Microsoft | Windows | - | All | All | All |
| Application | Paloaltonetworks | Cortex Xdr Agent | 6.1 | - | All | All |
| Application | Paloaltonetworks | Cortex Xdr Agent | 7.2 | - | All | All |
| Application | Paloaltonetworks | Cortex Xdr Agent | 7.2 | content_update149 | All | All |
| Application | Paloaltonetworks | Cortex Xdr Agent | 7.2 | content_update150 | All | All |
| Application | Paloaltonetworks | Cortex Xdr Agent | 7.3 | - | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| CVE-2021-3042 Cortex XDR Agent: Improper Control of User-Controlled File Leads to Local Privilege Escalation | MISC | security.paloaltonetworks.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
Discovery Credit
LEGACY: Palo Alto Networks thanks Xavier DANEST of Decathlon for discovering and reporting this issue.
There are currently no legacy QID mappings associated with this CVE.