A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. This was achieved by adding an entry to the registry under the Trellix ENS registry folder with a symbolic link to files that the user wouldn't normally have permission to. After a scan, the Engine would follow the links and remove the files
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published: 2024-01-09T12:56:46.957Z

Updated: 2024-08-01T17:41:16.227Z

Reserved: 2024-01-03T04:30:32.801Z

Link: CVE-2024-0206

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Analyzed

Published: 2024-01-09T14:15:46.550

Modified: 2024-01-16T16:27:52.677

Link: CVE-2024-0206

cve-icon Redhat

No data.