
Cloud Vulnerability DB
A community-led vulnerabilities database
A protection mechanism vulnerability was discovered in the Palo Alto Networks Cortex XDR agent on Windows devices, identified as CVE-2023-0002. The vulnerability was disclosed on February 8, 2023, affecting specific versions of the Cortex XDR agent. This security flaw enables local users to execute privileged cytool commands that could disable or uninstall the agent (Palo Alto).
The vulnerability has been assigned a CVSS v3.1 Base Score of 5.5 (MEDIUM severity) with the following characteristics: Local attack vector, low attack complexity, low privileges required, no user interaction needed, unchanged scope, no impact on confidentiality and integrity, but high impact on availability. The weakness type is classified as CWE-693 Protection Mechanism Failure (Palo Alto).
The primary impact of this vulnerability is on system availability, as successful exploitation allows local users to disable or uninstall the Cortex XDR agent, potentially leaving the system without its security monitoring and protection capabilities (Palo Alto).
The vulnerability has been fixed in Cortex XDR agent versions 5.0.12.22203, 7.5.101-CE, and all later supported versions. No workarounds are available for this issue, making it critical for affected users to update to the patched versions (Palo Alto).
The vulnerability was discovered and reported by Fernando Romero de la Morena and Robert McCallum from M42D, demonstrating active security research in the field (Palo Alto).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."