CVE-2024-5914

9.8 CRITICAL

📋 TL;DR

CVE-2024-5914 is a critical command injection vulnerability in Palo Alto Networks Cortex XSOAR CommonScripts Pack that allows unauthenticated attackers to execute arbitrary commands within integration containers. This affects organizations using Cortex XSOAR with the vulnerable CommonScripts Pack. Attackers can potentially gain control over affected systems.

💻 Affected Systems

Products:
  • Palo Alto Networks Cortex XSOAR
Versions: Cortex XSOAR CommonScripts Pack versions prior to 1.14.2
Operating Systems: Linux (container-based)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with the CommonScripts Pack installed. The vulnerability exists in specific scripts within the pack.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of the Cortex XSOAR environment, lateral movement to connected systems, data exfiltration, and deployment of ransomware or other malware across the network.

🟠

Likely Case

Initial access to the XSOAR environment, execution of commands within container context, potential privilege escalation to host system, and compromise of connected security tools and data.

🟢

If Mitigated

Limited impact due to network segmentation, container isolation, and proper access controls preventing lateral movement or critical system access.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

The vulnerability allows unauthenticated command injection, making exploitation straightforward for attackers with network access to vulnerable systems.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: CommonScripts Pack version 1.14.2

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-5914

Restart Required: No

Instructions:

1. Log into Cortex XSOAR. 2. Navigate to Marketplace. 3. Update CommonScripts Pack to version 1.14.2 or later. 4. Verify the update completed successfully.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to Cortex XSOAR instances to only trusted IP addresses and networks.

Disable Vulnerable Scripts

all

Identify and disable specific vulnerable scripts within the CommonScripts Pack if they are not required for operations.

🧯 If You Can't Patch

  • Isolate Cortex XSOAR instances from the internet and restrict internal network access
  • Implement strict network monitoring and alerting for suspicious commands or connections from XSOAR containers

🔍 How to Verify

Check if Vulnerable:

Check the installed version of CommonScripts Pack in Cortex XSOAR Marketplace. If version is earlier than 1.14.2, the system is vulnerable.

Check Version:

No direct CLI command. Check via Cortex XSOAR web interface under Marketplace > Installed Packs > CommonScripts Pack.

Verify Fix Applied:

Confirm CommonScripts Pack version is 1.14.2 or later in the Cortex XSOAR Marketplace interface.

📡 Detection & Monitoring

Log Indicators:

  • Unusual command execution in XSOAR container logs
  • Suspicious process creation from XSOAR integration containers
  • Authentication failures followed by command execution

Network Indicators:

  • Unexpected outbound connections from XSOAR containers
  • Traffic to suspicious IPs or domains from XSOAR systems

SIEM Query:

source="cortex-xsoar" AND (event_type="command_execution" OR process_name="sh" OR process_name="bash") AND user="unauthenticated"

🔗 References

📤 Share & Export