
CVE-2023-6072
https://notcve.org/view.php?id=CVE-2023-6072
13 Feb 2024 — A cross-site scripting vulnerability in Trellix Central Management (CM) prior to 9.1.3.97129 allows a remote authenticated attacker to craft CM dashboard internal requests causing arbitrary content to be injected into the response when accessing the CM dashboard. Una vulnerabilidad de cross-site scripting en Trellix Central Management (CM) anterior a 9.1.3.97129 permite a un atacante remoto autenticado crear solicitudes internas del panel de CM, lo que provoca que se inyecte contenido arbitrario en la respu... • https://docs.trellix.com/bundle/cm_9-1-5_rn/page/UUID-fad8a50f-6f6f-e970-f418-06494a30932e.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-0310
https://notcve.org/view.php?id=CVE-2024-0310
10 Jan 2024 — A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration. Una vulnerabilidad de política de seguridad de contenido en la extensión del navegador ENS Control anterior a 10.7.0 Actualización 15 permite a un atacante remoto alterar la configuración del parámetro del ... • https://kcm.trellix.com/corporate/index?page=content&id=SB10417 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVE-2024-0213
https://notcve.org/view.php?id=CVE-2024-0213
09 Jan 2024 — A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly. Vulnerabilidad de desbordamiento de búfer en TA para Linux y TA para MacOS anteriores a 5.8.1 permite a un usuario local obtener permiso... • https://kcm.trellix.com/corporate/index?page=content&id=SB10416 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVE-2024-0206
https://notcve.org/view.php?id=CVE-2024-0206
09 Jan 2024 — A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. This was achieved by adding an entry to the registry under the Trellix ENS registry folder with a symbolic link to files that the user wouldn't normally have permission to. After a scan, the Engine would follow the links and remove the files Una vulnerabilidad de manipulación de enlaces simbólicos en Trellix Anti-Malwa... • https://kcm.trellix.com/corporate/index?page=content&id=SB10415 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2023-6071
https://notcve.org/view.php?id=CVE-2023-6071
30 Nov 2023 — An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source. Una neutralización inadecuada de elementos especiales utilizados en una vulnerabilidad de comando en ESM anterior a la versión 11.6.9 permite a un administrador remoto ejecutar código arbitrario como root en ESM. Esto es posible porque la ... • https://kcm.trellix.com/corporate/index?page=content&id=SB10413 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVE-2023-6070
https://notcve.org/view.php?id=CVE-2023-6070
29 Nov 2023 — A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data Una vulnerabilidad de server-side request forgery en ESM anterior a la versión 11.6.8 permite que un usuario autenticado con pocos privilegios cargue contenido arbitrario, alterando potenci... • https://kcm.trellix.com/corporate/index?page=content&id=SB10413 • CWE-918: Server-Side Request Forgery (SSRF) •

CVE-2023-5607
https://notcve.org/view.php?id=CVE-2023-5607
27 Nov 2023 — An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content. Una limitación inadecuada de... • https://kcm.trellix.com/corporate/index?page=content&id=SB10411 • CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') •

CVE-2023-6119
https://notcve.org/view.php?id=CVE-2023-6119
16 Nov 2023 — An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege level. This is caused by GetSusp not correctly protecting a directory that it creates during execution, allowing an attacker to take over file handles used by GetSusp. As this runs with high privileges, the attacker gains elevated permissions. The file handles are opened as read-only. Una vulnerabilidad de Gestión d... • https://kcm.trellix.com/corporate/index?page=content&id=SB10412 • CWE-269: Improper Privilege Management •

CVE-2023-3665
https://notcve.org/view.php?id=CVE-2023-3665
04 Oct 2023 — A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables, leading to denial of service and or the execution of arbitrary code. Una vulnerabilidad de inyección de código en Trellix ENS 10.7.0 de abril de 2023 y versiones anteriores permitió a un usuario local deshabilitar el componente ENS AMSI a través de variables de entorno, lo que provocó la denegación de servicio o la ejecución de código arbitrar... • https://kcm.trellix.com/corporate/index?page=content&id=SB10405 • CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection') CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVE-2023-4814
https://notcve.org/view.php?id=CVE-2023-4814
14 Sep 2023 — A Privilege escalation vulnerability exists in Trellix Windows DLP endpoint for windows which can be abused to delete any file/folder for which the user does not have permission to. Existe una vulnerabilidad de escalada de privilegios en Trellix Windows DLP endpoint para Windows de la que se puede abusar para eliminar cualquier archivo/carpeta para el cual el usuario no tiene permiso. • https://kcm.trellix.com/corporate/index?page=content&id=SB10407 • CWE-250: Execution with Unnecessary Privileges CWE-863: Incorrect Authorization •