{"uuid": "833649d9-2fc0-4119-91ff-e3bd76b70d98", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2025-0113", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/11105", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2025-0113\n\ud83d\udd25 CVSS Score: 5.3 (cvssV4_0, Vector: CVSS:4.0/AV:P/AC:L/AT:P/PR:N/UI:N/VC:H/VI:H/VA:N/SC:N/SI:N/SA:N/AU:Y/R:U/V:C/RE:M/U:Amber)\n\ud83d\udd39 Description: A problem with the network isolation mechanism of the Palo Alto Networks Cortex XDR Broker VM allows attackers unauthorized access to Docker containers from the host network used by Broker VM. This may allow access to read files sent for analysis and logs transmitted by the Cortex XDR Agent to the Cortex XDR server.\n\ud83d\udccf Published: 2025-02-12T21:05:08.795Z\n\ud83d\udccf Modified: 2025-04-09T16:16:48.152Z\n\ud83d\udd17 References:\n1. https://security.paloaltonetworks.com/CVE-2025-0113", "creation_timestamp": "2025-04-09T16:48:32.000000Z"}