Palo Alto Networks patches Cortex XSOAR critical flaw, high severity flaws in Prisma Access Browser
Take action: If you are using Palo Alto Cortex XSOAR, check for the specific vulnerable configuration. If it exists, patch ASAP. Otherwise, plan a normal patch cycle. For the Prisma Access Browser, it's a bunch of Chromium fixes, so it's an easy patch - don't delay.
Learn More
Palo Alto Networks has released patches for multiple vulnerabilities across several of its products
- The most critical is CVE-2024-5914 (CVSS score varies from 7 to 9.8), a command injection vulnerability found in the Cortex XSOAR security orchestration, automation, and response (SOAR) product. This flaw affects the product's CommonScripts Pack and can allow unauthenticated attackers to execute arbitrary commands within the context of an integration container. It is important to note that only specific configurations are vulnerable: an integration must make use of the ScheduleGenericPolling or GenericPollingScheduledTask scripts from the CommonScripts pack.
Additionally, Palo Alto Networks addressed high-severity vulnerabilities in the Prisma Access Browser, which is based on Chromium. The latest updates incorporate over 30 upstream security fixes, protecting against various vulnerabilities.
Although Palo Alto Networks has confirmed that no malicious exploitation of these vulnerabilities has been observed, previous incidents have shown that threat actors, including state-sponsored groups, have targeted Palo Alto Networks products.