The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.
References
Link | Resource |
---|---|
https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US | Mitigation Vendor Advisory |
https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US | Mitigation Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:37
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.9 |
References | () https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US - Mitigation, Vendor Advisory |
07 Nov 2023, 04:00
Type | Values Removed | Values Added |
---|---|---|
Summary | The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data. |
Information
Published : 2023-02-02 09:15
Updated : 2024-11-21 07:37
NVD link : CVE-2023-0400
Mitre link : CVE-2023-0400
CVE.ORG link : CVE-2023-0400
JSON object : View
Products Affected
microsoft
- windows
trellix
- data_loss_prevention