CVE-2022-0020
moderate-risk
Published 2022-02-10
A stored cross-site scripting (XSS) vulnerability in Palo Alto Network Cortex XSOAR web interface enables an authenticated network-based attacker to store a persistent javascript payload that will perform arbitrary actions in the Cortex XSOAR web interface on behalf of authenticated administrators who encounter the payload during normal operations. This issue impacts: All builds of Cortex XSOAR 6.1.0; Cortex XSOAR 6.2.0 builds earlier than build 1958888.
Do I need to act?
~
1.0% chance of exploitation in next 30 days
EPSS score — moderate exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
!
1 public exploit available
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.8/10
Medium
NETWORK
/ LOW complexity
Affected Products (13)
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Cortex Xsoar
Affected Vendors
References (4)
Vendor Advisory
https://security.paloaltonetworks.com/CVE-2022-0020
Vendor Advisory
https://security.paloaltonetworks.com/CVE-2022-0020
45
/ 100
moderate-risk
Severity
25/34 · High
Exploitability
3/34 · Minimal
Exposure
17/34 · Moderate