{"api_version":"1","generated_at":"2026-04-22T22:58:53+00:00","cve":"CVE-2023-3282","urls":{"html":"https://cve.report/CVE-2023-3282","api":"https://cve.report/api/cve/CVE-2023-3282.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-3282","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-3282"},"summary":{"title":"CVE-2023-3282","description":"A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system enables a local attacker to execute programs with elevated privileges if the attacker has shell access to the engine.","state":"PUBLIC","assigner":"psirt@paloaltonetworks.com","published_at":"2023-11-08 18:15:00","updated_at":"2023-11-16 16:26:00"},"problem_types":["CWE-732"],"metrics":[],"references":[{"url":"https://security.paloaltonetworks.com/CVE-2023-3282","name":"https://security.paloaltonetworks.com/CVE-2023-3282","refsource":"","tags":[],"title":"CVE-2023-3282 Cortex XSOAR: Local Privilege Escalation (PE) Vulnerability in Cortex XSOAR Engine","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-3282","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3282","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"3282","vulnerable":"-1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"o","cpe4":"linux","cpe5":"linux_kernel","cpe6":"-","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2023","cve_id":"3282","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"paloaltonetworks","cpe5":"cortex_xsoar","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-3282","ASSIGNER":"psirt@paloaltonetworks.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system enables a local attacker to execute programs with elevated privileges if the attacker has shell access to the engine."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-732 Incorrect Permission Assignment for Critical Resource","cweId":"CWE-732"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Palo Alto Networks","product":{"product_data":[{"product_name":"Cortex XSOAR","version":{"version_data":[{"version_value":"not down converted","x_cve_json_5_version_data":{"versions":[{"changes":[{"at":"6.10.0.250144","status":"unaffected"}],"lessThan":"6.10.0.250144","status":"affected","version":"6.10","versionType":"custom"},{"status":"unaffected","version":"6.11"},{"status":"unaffected","version":"6.12"},{"status":"unaffected","version":"8"}],"defaultStatus":"unaffected"}}]}}]}}]}},"references":{"reference_data":[{"url":"https://security.paloaltonetworks.com/CVE-2023-3282","refsource":"MISC","name":"https://security.paloaltonetworks.com/CVE-2023-3282"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"defect":["CRTX-70551"],"discovery":"EXTERNAL"},"configuration":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This issue is applicable only to Cortex XSOAR engines installed through the shell method that are running on a Linux operating system.<br><br>Please see the following link for more Cortex XSOAR engine installation information:<br><a target=\"_blank\" rel=\"nofollow\" href=\"https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Install-a-Cortex-XSOAR-Engine\">https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Instal...</a><br>"}],"value":"This issue is applicable only to Cortex XSOAR engines installed through the shell method that are running on a Linux operating system.\n\nPlease see the following link for more Cortex XSOAR engine installation information:\n https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Instal... https://docs-cortex.paloaltonetworks.com/r/Cortex-XSOAR/6.10/Cortex-XSOAR-Administrator-Guide/Install-a-Cortex-XSOAR-Engine \n"}],"exploit":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.<br>"}],"value":"Palo Alto Networks is not aware of any malicious exploitation of this issue.\n"}],"solution":[{"lang":"en","supportingMedia":[{"base64":false,"type":"text/html","value":"This issue is fixed in deployed Cortex XSOAR engines when an updated engine installer is created and used to upgrade the engine from Cortex XSOAR 6.10 build B250144 and all later builds of Cortex XSOAR.<br>"}],"value":"This issue is fixed in deployed Cortex XSOAR engines when an updated engine installer is created and used to upgrade the engine from Cortex XSOAR 6.10 build B250144 and all later builds of Cortex XSOAR.\n"}],"credits":[{"lang":"en","value":"Romeo Benzoni"}],"impact":{"cvss":[{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":6.4,"baseSeverity":"MEDIUM","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-11-08 18:15:00","lastModifiedDate":"2023-11-16 16:26:00","problem_types":["CWE-732"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":6.7,"baseSeverity":"MEDIUM"},"exploitabilityScore":0.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"AND","children":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:paloaltonetworks:cortex_xsoar:*:*:*:*:*:*:*:*","versionEndExcluding":"6.10.0","cpe_name":[]}]},{"operator":"OR","children":[],"cpe_match":[{"vulnerable":false,"cpe23Uri":"cpe:2.3:o:linux:linux_kernel:-:*:*:*:*:*:*:*","cpe_name":[]}]}],"cpe_match":[]}]}},"legacy_mitre":{"record":null,"notes":[]}}}