Lucene search

K
cve[email protected]CVE-2023-0976
HistoryJun 07, 2023 - 8:15 a.m.

CVE-2023-0976

2023-06-0708:15:09
CWE-427
web.nvd.nist.gov
12
cve-2023-0976
command injection
vulnerability
macos
ta
file execution
system tree

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.9%

A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/Β folder. The malicious file is executed by running the TA deployment feature located in the System Tree.

Affected configurations

NVD
Node
trellixagentRange<5.7.9
AND
applemacosMatch-
CPENameOperatorVersion
trellix:agenttrellix agentlt5.7.9

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "MacOS"
    ],
    "product": "Trellix Agent",
    "vendor": "Trellix",
    "versions": [
      {
        "status": "affected",
        "version": "5.7.8"
      }
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

7.7 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

9.9%

Related for CVE-2023-0976