{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Cortex XDR agent versions 5.0.12.x ant\u00e9rieures \u00e0 5.0.12.22203 sur Windows","product":{"name":"Cortex XDR Agent","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Cortex XSOAR versions 6.6 ant\u00e9rieures au build num\u00e9ro B186115","product":{"name":"Cortex XSOAR","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Cortex XSOAR versions 6.8 ant\u00e9rieures au build num\u00e9ro B185719","product":{"name":"Cortex XSOAR","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Cortex XSOAR versions 6.10 ant\u00e9rieures au build num\u00e9ro 185964","product":{"name":"Cortex XSOAR","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Cortex XDR agent versions 7.5.x-CE ant\u00e9rieures \u00e0 7.5.101-CE sur Windows","product":{"name":"Cortex XDR Agent","vendor":{"name":"Palo Alto Networks","scada":false}}},{"description":"Cortex XSOAR versions 6.9 ant\u00e9rieures au build num\u00e9ro B185415","product":{"name":"Cortex XSOAR","vendor":{"name":"Palo Alto Networks","scada":false}}}],"affected_systems_content":null,"content":"## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l'\u00e9diteur pour l'obtention des\ncorrectifs (cf. section Documentation).\n","cves":[{"name":"CVE-2023-0003","url":"https://www.cve.org/CVERecord?id=CVE-2023-0003"},{"name":"CVE-2023-0001","url":"https://www.cve.org/CVERecord?id=CVE-2023-0001"},{"name":"CVE-2023-0002","url":"https://www.cve.org/CVERecord?id=CVE-2023-0002"}],"links":[{"title":"Bulletin de s\u00e9curit\u00e9 PaloAlto du 08 f\u00e9vrier 2023","url":"https://security.paloaltonetworks.com/CVE-2023-0003"},{"title":"Bulletin de s\u00e9curit\u00e9 PaloAlto du 08 f\u00e9vrier 2023","url":"https://security.paloaltonetworks.com/CVE-2023-0001"},{"title":"Bulletin de s\u00e9curit\u00e9 PaloAlto du 08 f\u00e9vrier 2023","url":"https://security.paloaltonetworks.com/CVE-2023-0002"}],"reference":"CERTFR-2023-AVI-0105","revisions":[{"description":"Version initiale","revision_date":"2023-02-09T00:00:00.000000"}],"risks":[{"description":"Atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es"},{"description":"Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"}],"summary":"De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans <span\nclass=\"textit\">PaloAlto</span>. Elles permettent \u00e0 un attaquant de\nprovoquer une atteinte \u00e0 l'int\u00e9grit\u00e9 des donn\u00e9es et une atteinte \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n","title":"Multiples vuln\u00e9rabilit\u00e9s dans les produits PaloAlto","vendor_advisories":[{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 PaloAlto CVE-2023-0003 du 08 f\u00e9vrier 2023","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 PaloAlto CVE-2023-0001 du 08 f\u00e9vrier 2023","url":null},{"published_at":null,"title":"Bulletin de s\u00e9curit\u00e9 PaloAlto CVE-2023-0002 du 08 f\u00e9vrier 2023","url":null}]}
