A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree.
References
Link | Resource |
---|---|
https://kcm.trellix.com/corporate/index?page=content&id=SB10398 | Vendor Advisory |
https://kcm.trellix.com/corporate/index?page=content&id=SB10398 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
21 Nov 2024, 07:38
Type | Values Removed | Values Added |
---|---|---|
References | () https://kcm.trellix.com/corporate/index?page=content&id=SB10398 - Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 6.3 |
Information
Published : 2023-06-07 08:15
Updated : 2024-11-21 07:38
NVD link : CVE-2023-0976
Mitre link : CVE-2023-0976
CVE.ORG link : CVE-2023-0976
JSON object : View
Products Affected
apple
- macos
trellix
- agent
CWE
CWE-427
Uncontrolled Search Path Element