CVE-2022-0031

Cortex XSOAR: Local Privilege Escalation (PE) Vulnerability in Cortex XSOAR Engine

Description

A local privilege escalation (PE) vulnerability in the Palo Alto Networks Cortex XSOAR engine software running on a Linux operating system allows a local attacker with shell access to the engine to execute programs with elevated privileges.

Remediation

Solution:

  • This issue is fixed in Cortex XSOAR engine software available in Cortex XSOAR 6.9.0 build 130766 and all later versions of Cortex XSOAR.

Workaround:

  • There are no known workarounds for this issue.

Category

6.7
CVSS
Severity: Medium
CVSS 3.1 •
EPSS 0.03%
Vendor Advisory paloaltonetworks.com
Affected: Palo Alto Networks Cortex XSOAR
Published at:
Updated at:

References

Frequently Asked Questions

What is the severity of CVE-2022-0031?
CVE-2022-0031 has been scored as a medium severity vulnerability.
How to fix CVE-2022-0031?
To fix CVE-2022-0031: This issue is fixed in Cortex XSOAR engine software available in Cortex XSOAR 6.9.0 build 130766 and all later versions of Cortex XSOAR.
Is CVE-2022-0031 being actively exploited in the wild?
As for now, there are no information to confirm that CVE-2022-0031 is being actively exploited. According to its EPSS score, there is a ~0% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
What software or system is affected by CVE-2022-0031?
CVE-2022-0031 affects Palo Alto Networks Cortex XSOAR.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.