Unauthenticated Remote Attackers Can Bypass Authentication and Gain API Access to Manager
CVE-2024-5957
7.5HIGH
Summary
This vulnerability allows unauthenticated remote attackers to exploit the Trellix Manager by bypassing authentication mechanisms. By exploiting this flaw, attackers can gain unauthorized access to sensitive APIs, posing significant risks to the integrity and security of the affected systems. Organizations utilizing Trellix Manager should prioritize assessing their exposure to this vulnerability and implement necessary security measures to mitigate the impact.
Affected Version(s)
Intrusion Prevention System (IPS) Manager Windows 11.1.7.97
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
High
Integrity:
None
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Kentaro Kawane