CVE-2023-3665
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables,
leading to denial of service and or the execution of arbitrary code.
Una vulnerabilidad de inyección de código en Trellix ENS 10.7.0 de abril de 2023 y versiones anteriores permitió a un usuario local deshabilitar el componente ENS AMSI a través de variables de entorno, lo que provocó la denegación de servicio o la ejecución de código arbitrario.
A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables, leading to denial of service and or the execution of arbitrary code.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2023-07-13 CVE Reserved
- 2023-10-04 CVE Published
- 2024-09-19 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-74: Improper Neutralization of Special Elements in Output Used by a Downstream Component ('Injection')
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
- CAPEC-549: Local Execution of Code
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://kcm.trellix.com/corporate/index?page=content&id=SB10405 | 2023-10-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Trellix Search vendor "Trellix" | Endpoint Security Search vendor "Trellix" for product "Endpoint Security" | <= 10.7.0 Search vendor "Trellix" for product "Endpoint Security" and version " <= 10.7.0" | - |
Affected
|