Hardcoded credentials vulnerability in Trellix ePolicy Orchestrator (ePO) on Premise prior to 5.10 Service Pack 1 Update 2 allows an attacker with admin privileges on the ePO server to read the contents of the orion.keystore file, allowing them to access the ePO database encryption key. This was possible through using a hard coded password for the keystore. Access Control restrictions on the file mean this would not be exploitable unless the user is the system admin for the server that ePO is running on.
References
Link | Resource |
---|---|
https://thrive.trellix.com/s/article/000013505 |
Configurations
No configuration.
History
16 May 2024, 07:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-05-16 07:15
Updated : 2024-05-16 13:03
NVD link : CVE-2024-4844
Mitre link : CVE-2024-4844
CVE.ORG link : CVE-2024-4844
JSON object : View
Products Affected
No product.
CWE
CWE-798
Use of Hard-coded Credentials