Unauthenticated Remote Attackers Can Bypass Authentication and Gain API Access to Manager
CVE-2024-5957

7.5HIGH

Key Information:

Vendor
Trellix
Vendor
CVE Published:
5 September 2024

Summary

This vulnerability allows unauthenticated remote attackers to exploit the Trellix Manager by bypassing authentication mechanisms. By exploiting this flaw, attackers can gain unauthorized access to sensitive APIs, posing significant risks to the integrity and security of the affected systems. Organizations utilizing Trellix Manager should prioritize assessing their exposure to this vulnerability and implement necessary security measures to mitigate the impact.

Affected Version(s)

Intrusion Prevention System (IPS) Manager Windows 11.1.7.97

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Kentaro Kawane
.
CVE-2024-5957 : Unauthenticated Remote Attackers Can Bypass Authentication and Gain API Access to Manager | SecurityVulnerability.io