CVE-2024-8690

4.4 MEDIUM

📋 TL;DR

A vulnerability in Palo Alto Networks Cortex XDR agent on Windows allows administrators to disable the endpoint detection agent. This could enable malware to disable security monitoring before performing malicious activities. Only Windows systems with Cortex XDR agent and administrator access are affected.

💻 Affected Systems

Products:
  • Palo Alto Networks Cortex XDR agent
Versions: Cortex XDR agent 8.0 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations where users have administrator privileges. Linux and macOS versions are not affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malware with administrator privileges disables Cortex XDR agent, evades detection, and performs extensive malicious activities including data exfiltration, ransomware deployment, or persistent backdoor installation.

🟠

Likely Case

Targeted malware or attackers with administrative access disable the agent to bypass security controls and execute malicious payloads without detection.

🟢

If Mitigated

With proper privilege management and monitoring, impact is limited as unauthorized administrator access would be required and detected.

🌐 Internet-Facing: LOW - This requires local administrator access, not directly exploitable from internet.
🏢 Internal Only: MEDIUM - Internal attackers or malware with admin privileges can exploit this to disable security monitoring.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires Windows administrator privileges. The vulnerability is in the detection mechanism that should prevent agent disabling.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Cortex XDR agent 8.1 and later

Vendor Advisory: https://security.paloaltonetworks.com/CVE-2024-8690

Restart Required: Yes

Instructions:

1. Update Cortex XDR agent to version 8.1 or later. 2. Deploy through Cortex XDR management console or manually install updated agent. 3. Restart affected Windows systems after update.

🔧 Temporary Workarounds

Restrict Administrator Privileges

windows

Limit Windows administrator access to only necessary users to reduce attack surface.

Enhanced Monitoring

all

Implement additional monitoring for agent status changes and unauthorized privilege escalation attempts.

🧯 If You Can't Patch

  • Implement strict least privilege access controls to limit Windows administrator accounts
  • Deploy additional endpoint security controls and monitoring to detect agent tampering

🔍 How to Verify

Check if Vulnerable:

Check Cortex XDR agent version on Windows systems. Versions 8.0 and earlier are vulnerable.

Check Version:

Check agent version in Cortex XDR console or run: Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like "*Cortex XDR*"} | Select-Object Name, Version

Verify Fix Applied:

Verify agent version is 8.1 or later and confirm agent is running and cannot be disabled by administrators.

📡 Detection & Monitoring

Log Indicators:

  • Cortex XDR agent service stopped unexpectedly
  • Unauthorized attempts to modify agent configuration
  • Administrator privilege escalation events

Network Indicators:

  • Sudden drop in agent heartbeat communications
  • Unusual outbound traffic after agent stops

SIEM Query:

EventID=7036 AND ServiceName="Cortex XDR Agent" AND (State="stopped" OR State="paused")

🔗 References

📤 Share & Export