Command Injection Flaw in ESM Affects Trellix
CVE-2023-6071

8.4HIGH

Key Information:

Vendor

Trellix

Status
Vendor
CVE Published:
30 November 2023

What is CVE-2023-6071?

A command injection vulnerability exists in ESM prior to version 11.6.9 due to insufficient input sanitization when adding a new data source. This flaw allows a remote administrator to execute arbitrary code as the root user on the system, posing significant risks to the integrity and security of the affected environment. Proper mitigation strategies should be implemented to address this vulnerability and protect against potential exploitation.

Affected Version(s)

ESM Prior to version 11.6.9

References

CVSS V3.1

Score:
8.4
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
Required
Scope:
Changed

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.