--- licence_title: Creative Commons Attribution 4.0 International (CC-BY 4.0) licence_link: https://creativecommons.org/licenses/by/4.0/ licence_restrictions: https://cert.europa.eu/legal-notice licence_author: CERT-EU, The Cybersecurity Service for the European Union institutions, bodies, offices and agencies title: 'Palo Alto Cortex XSOAR CommonScripts Critical Vulnerability' number: '2024-083' version: '1.1' original_date: 'August 14, 2024' date: 'August 20, 2024' --- _History:_ * _19/08/2024 --- v1.0 -- Initial publication_ * _20/08/2024 --- v1.1 -- Correction to specify that only CommonScripts Pack is affected_ # Summary On August 14, 2024, Palo Alto Networks released a security advisory for a critical command injection vulnerability, **CVE-2024-5914**, in Cortex XSOAR [1, 2]. This flaw allows unauthenticated attackers to execute arbitrary commands within the context of an integration container, potentially compromising the system. The vulnerability affects the product's CommonScripts Pack and is rated as high severity with a CVSS score of 9.0. # Technical Details CVE-2024-5914 is a command injection vulnerability that can be exploited without authentication. It affects specific configurations of Cortex XSOAR’s CommonScripts Pack, allowing remote attackers to execute arbitrary commands. # Affected Products - Palo Alto Networks Cortex XSOAR CommonScripts prior to 1.12.33 [2] # Recommendations CERT-EU recommends applying the patches included in versions starting with 1.12.33 immediately to mitigate this vulnerability. # References [1] [2]