Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-5905: CWE-346 Origin Validation Error in Palo Alto Networks Cortex XDR Agent

0
Low
VulnerabilityCVE-2024-5905cvecve-2024-5905cwe-346
Published: Wed Jun 12 2024 (06/12/2024, 16:20:35 UTC)
Source: CVE Database V5
Vendor/Project: Palo Alto Networks
Product: Cortex XDR Agent

Description

CVE-2024-5905 is a low-severity vulnerability in the Palo Alto Networks Cortex XDR Agent for Windows that involves an origin validation error (CWE-346). It allows a local low-privileged Windows user to disrupt some non-protection-related functionality of the agent but does not enable bypassing or disabling of the agent's core protection mechanisms. The vulnerability affects versions 7. 9-CE, 8. 1. 0, and 8. 2. 0 of the Cortex XDR Agent. Exploitation requires local access with low privileges and does not require user interaction or authentication beyond that. There are no known exploits in the wild, and no patches have been linked yet.

AI-Powered Analysis

AILast updated: 02/26/2026, 02:55:24 UTC

Technical Analysis

CVE-2024-5905 is a vulnerability identified in the Palo Alto Networks Cortex XDR Agent running on Windows devices, categorized under CWE-346, which relates to origin validation errors. This flaw arises from improper validation of the origin of certain requests or commands within the agent's protection mechanism. Specifically, a local user with low privileges can exploit this weakness to disrupt some functionalities of the Cortex XDR agent. However, the vulnerability does not allow the attacker to compromise or disable the agent's core protection features, such as its ability to detect or prevent threats. The affected versions include 7.9-CE, 8.1.0, and 8.2.0. The attack vector is local (AV:L), requiring the attacker to have low-level access to the Windows system, and the attack complexity is high (AC:H), indicating that exploitation is not straightforward. No user interaction is required, and the vulnerability does not affect confidentiality or availability significantly but has a limited impact on integrity. The CVSS 4.0 score of 2.0 reflects these factors. No known exploits are currently in the wild, and no official patches have been published at the time of disclosure. The vulnerability's root cause is an origin validation error, meaning the agent does not adequately verify the source of certain internal commands or requests, allowing a local low-privileged user to interfere with some agent functions. This could lead to partial disruption of endpoint monitoring or response capabilities, potentially complicating incident response or forensic investigations.

Potential Impact

The primary impact of CVE-2024-5905 is the potential disruption of some functionalities of the Cortex XDR agent by a local low-privileged user on Windows endpoints. Although the core protection mechanisms remain intact, this disruption could degrade the effectiveness of endpoint detection and response capabilities, possibly delaying threat detection or response activities. For organizations relying heavily on Cortex XDR for endpoint security, this could reduce visibility into attacks or hinder automated responses temporarily. Since exploitation requires local access with low privileges, the risk is limited to scenarios where an attacker or malicious insider already has some foothold on the endpoint. The vulnerability does not allow privilege escalation or bypass of security controls, so the overall risk to confidentiality and availability is low. However, in high-security environments or those with strict compliance requirements, even limited disruption of security agents can have operational and regulatory consequences. The absence of known exploits reduces immediate risk, but organizations should remain vigilant. The impact is more significant in environments with many users having local access or where endpoints are shared or less controlled.

Mitigation Recommendations

To mitigate CVE-2024-5905, organizations should implement the following specific measures: 1) Restrict local user permissions on Windows endpoints to the minimum necessary, preventing low-privileged users from accessing or interacting with Cortex XDR agent components beyond their role. 2) Monitor and audit local user activities on endpoints to detect any attempts to interfere with security agent processes or functionalities. 3) Apply strict endpoint hardening policies, including application whitelisting and process monitoring, to detect anomalous behavior targeting the Cortex XDR agent. 4) Stay informed on Palo Alto Networks advisories and promptly apply patches or updates once they become available for the affected Cortex XDR versions. 5) Use endpoint protection management tools to enforce agent integrity and automatically remediate disruptions. 6) Educate users about the risks of local access and enforce strong access controls, especially in shared or multi-user environments. 7) Consider deploying additional endpoint monitoring layers to detect any unusual disruptions in security agent operations. These steps go beyond generic advice by focusing on minimizing local user capabilities and enhancing detection of agent interference.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.1
Assigner Short Name
palo_alto
Date Reserved
2024-06-12T15:27:53.779Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 699f6bf6b7ef31ef0b55d121

Added to database: 2/25/2026, 9:39:02 PM

Last enriched: 2/26/2026, 2:55:24 AM

Last updated: 2/26/2026, 11:13:43 AM

Views: 1

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats