A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
Metrics
Affected Vendors & Products
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-12963 | A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack |
Solution
To remediate this issue, customers running ATD/IS 5.2.0 or earlier must go to the Product Downloads site https://www.trellix.com/en-us/downloads/my-products.html and download the applicable product update/hotfix file:
Workaround
No workaround given by the vendor.
Tue, 04 Mar 2025 03:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2025-02-27T19:15:59.531Z
Reserved: 2023-02-23T05:28:48.678Z
Link: CVE-2023-0978
Updated: 2024-08-02T05:32:46.183Z
Status : Modified
Published: 2023-03-13T14:15:12.727
Modified: 2024-11-21T07:38:13.350
Link: CVE-2023-0978
No data.
OpenCVE Enrichment
No data.
EUVD