CVE-2023-0400

The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.
References
Configurations

Configuration 1 (hide)

AND
cpe:2.3:a:trellix:data_loss_prevention:*:*:*:*:*:*:*:*
cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

History

07 Nov 2023, 04:00

Type Values Removed Values Added
Summary The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data. The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.

Information

Published : 2023-02-02 09:15

Updated : 2024-02-28 19:51


NVD link : CVE-2023-0400

Mitre link : CVE-2023-0400

CVE.ORG link : CVE-2023-0400


JSON object : View

Products Affected

trellix

  • data_loss_prevention

microsoft

  • windows
CWE
CWE-427

Uncontrolled Search Path Element

CWE-670

Always-Incorrect Control Flow Implementation