Lucene search

K
cve[email protected]CVE-2023-5607
HistoryNov 27, 2023 - 11:15 a.m.

CVE-2023-5607

2023-11-2711:15:08
CWE-22
web.nvd.nist.gov
10
cve-2023-5607
path traversal
tacc epo
arbitrary code execution
security vulnerability
nvd

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content.

Affected configurations

NVD
Node
trellixapplication_and_change_controlRange<8.4.0

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "product": "Trellix Application and Change Control (TACC)",
    "vendor": "Trellix",
    "versions": [
      {
        "status": "affected",
        "version": "Prior to version 8.4.0"
      }
    ]
  }
]

8.4 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:C/C:H/I:H/A:H

7.1 High

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

16.4%

Related for CVE-2023-5607