A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
Metrics
Affected Vendors & Products
Source | ID | Title |
---|---|---|
![]() |
EUVD-2023-12963 | A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack |
Solution
To remediate this issue, customers running ATD/IS 5.2.0 or earlier must go to the Product Downloads site https://www.trellix.com/en-us/downloads/my-products.html and download the applicable product update/hotfix file:
Workaround
No workaround given by the vendor.
Tue, 04 Mar 2025 03:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Metrics |
ssvc
|

Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2025-02-27T19:15:59.531Z
Reserved: 2023-02-23T05:28:48.678Z
Link: CVE-2023-0978

Updated: 2024-08-02T05:32:46.183Z

Status : Modified
Published: 2023-03-13T14:15:12.727
Modified: 2024-11-21T07:38:13.350
Link: CVE-2023-0978

No data.

No data.