CVE-2023-0400

The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trellix:data_loss_prevention:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

21 Nov 2024, 07:37

Type Values Removed Values Added
CVSS v2 : unknown
v3 : 8.2
v2 : unknown
v3 : 5.9
References () https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US - Mitigation, Vendor Advisory () https://kcm.trellix.com/corporate/index?page=content&id=SB10394&locale=en_US - Mitigation, Vendor Advisory

07 Nov 2023, 04:00

Type Values Removed Values Added
Summary The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data. The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.

Information

Published : 2023-02-02 09:15

Updated : 2024-11-21 07:37


NVD link : CVE-2023-0400

Mitre link : CVE-2023-0400

CVE.ORG link : CVE-2023-0400


JSON object : View

Products Affected

microsoft

  • windows

trellix

  • data_loss_prevention
CWE
CWE-670

Always-Incorrect Control Flow Implementation

CWE-427

Uncontrolled Search Path Element