Cybersecurity specialists report the detection of a critical vulnerability in Cortex XSOAR, the detection and response platform executed on fully integrated endpoint, network and cloud data developed by Palo Alto Networks.

Tracked as CVE-2021-26701, this flaw exists due to insufficient validation of user input in .NET Core, which would allow remote threat actors to pass specially crafted entries into the vulnerable application.

The vulnerability received a score of 7.1/10 according to the Common Vulnerability Scoring System (CVSS) and its successful exploitation would allow arbitrary code to be executed on the affected system. This flaw resides in all versions of Cortex XSOAR prior to v7.1.3.20270.

Even though the flaws can be exploited by unauthenticated threat actors over the Internet, researchers have not detected any active exploitation attempts. Security patches have already been released, so users of affected deployments are encouraged to update as soon as possible. 

To learn more about information security risks, malware variants, vulnerabilities and information technologies, feel free to access the International Institute of Cyber Security (IICS) websites.

The post Critical Remote code execution vulnerability in Palo Alto Networks Cortex XSOAR appeared first on Information Security Newspaper | Hacking News.

You May Also Like

CVE-2021-41163 Discourse forum software vulnerability can be very dangerous warns CISA

In a statement, the Cybersecurity and Infrastructure Security Agency (CISA) warned of…

Critical vulnerability in Less.js cause your plugins to leak confidential data like AWS keys

Cybersecurity specialists report the discovery of a critical vulnerability in Less.js, a…