Unauthenticated Remote Code Execution Vulnerability in Trellix IPS Manager
CVE-2024-5671
Summary
The Trellix IPS Manager has been found to have a critical security vulnerability, CVE-2024-5671, which allows unauthenticated remote attackers to perform arbitrary code execution, potentially giving them complete control over the affected systems. This vulnerability has a high impact on confidentiality, integrity, and availability and could result in data theft, service disruption, and compromise of the entire network managed by the Trellix IPS Manager. It is recommended that organizations using the affected versions of the Trellix IPS Manager apply patches immediately, enhance monitoring and detection capabilities, and restrict access to the IPS Manager from untrusted networks and sources. As of now, there are no known cases of CVE-2024-5671 being exploited in the wild.
Affected Version(s)
Intrusion Prevention System (IPS) Manager Prior to 11.1.x
News Articles

Critical Vulnerability in Trellix IPS Manager Flaw Allows Remote Code Execution
Trellix has patched a critical security vulnerability in its Intrusion Prevention System (IPS) Manager, CVE-2024-5671.
References
CVSS V3.1
Timeline
- 📰
First article discovered by CybersecurityNews
Vulnerability published
Vulnerability Reserved