Lucene search

K
cve[email protected]CVE-2023-3313
HistoryJul 03, 2023 - 8:15 a.m.

CVE-2023-3313

2023-07-0308:15:09
CWE-78
web.nvd.nist.gov
2347
cve-2023-3313
os injection
esm certificate api
command execution
privilege escalation

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.7%

An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.

Affected configurations

NVD
Node
trellixenterprise_security_managerRange<11.6.7

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows"
    ],
    "product": "Enterprise Security Manager",
    "vendor": "Trellix",
    "versions": [
      {
        "status": "affected",
        "version": "11.6.3"
      }
    ]
  }
]

7.8 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

0.0004 Low

EPSS

Percentile

9.7%

Related for CVE-2023-3313