An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege level. This is caused by GetSusp not correctly protecting a directory that it creates during execution, allowing an attacker to take over file handles used by GetSusp. As this runs with high privileges, the attacker gains elevated permissions. The file handles are opened as read-only.
References
Link | Resource |
---|---|
https://kcm.trellix.com/corporate/index?page=content&id=SB10412 | Vendor Advisory |
https://kcm.trellix.com/corporate/index?page=content&id=SB10412 | Vendor Advisory |
Configurations
History
21 Nov 2024, 08:43
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.5 |
References | () https://kcm.trellix.com/corporate/index?page=content&id=SB10412 - Vendor Advisory |
29 Nov 2023, 19:32
Type | Values Removed | Values Added |
---|---|---|
First Time |
Trellix
Trellix getsusp |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
References | () https://kcm.trellix.com/corporate/index?page=content&id=SB10412 - Vendor Advisory | |
CPE | cpe:2.3:a:trellix:getsusp:*:*:*:*:*:*:*:* | |
CWE | CWE-269 |
16 Nov 2023, 10:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-16 10:15
Updated : 2024-11-21 08:43
NVD link : CVE-2023-6119
Mitre link : CVE-2023-6119
CVE.ORG link : CVE-2023-6119
JSON object : View
Products Affected
trellix
- getsusp
CWE
CWE-269
Improper Privilege Management