Lucene search

K
cve[email protected]CVE-2022-3859
HistoryNov 30, 2022 - 9:15 a.m.

CVE-2022-3859

2022-11-3009:15:08
CWE-427
web.nvd.nist.gov
25
12
cve-2022-3859
vulnerability
trellix agent
ta
windows
privilege escalation
dll
nvd

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

12.7%

An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there.

Affected configurations

NVD
Node
trellixagentRange<5.7.8windows
CPENameOperatorVersion
trellix:agenttrellix agentlt5.7.8

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows"
    ],
    "product": "Trellix Agent",
    "vendor": "Trellix",
    "versions": [
      {
        "lessThanOrEqual": "5.7.8",
        "status": "affected",
        "version": "5.x",
        "versionType": "custom"
      }
    ]
  }
]

Social References

More

6.7 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

12.7%

Related for CVE-2022-3859