Lucene search

K
cvelistTrellixCVELIST:CVE-2022-3338
HistoryOct 18, 2022 - 12:00 a.m.

CVE-2022-3338 XXE in Trellix ePO server

2022-10-1800:00:00
CWE-611
trellix
www.cve.org
cve-2022-3338; xxe vulnerability; trellix epo server; server side request forgery; api exploit

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.9%

An External XML entity (XXE) vulnerability in ePO prior to 5.10 Update 14 can lead to an unauthenticated remote attacker to potentially trigger a Server Side Request Forgery attack. This can be exploited by mimicking the Agent Handler call to ePO and passing the carefully constructed XML file through the API.

CNA Affected

[
  {
    "vendor": "Trellix",
    "product": "Trellix ePolicy Orchestrator (ePO)",
    "versions": [
      {
        "version": "unspecified",
        "lessThan": "5.10 Update 14",
        "status": "affected",
        "versionType": "custom"
      }
    ]
  }
]

5.4 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N

6 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

46.9%

Related for CVELIST:CVE-2022-3338