- Description
- A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
- Source
- trellixpsirt@trellix.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mcafee:advanced_threat_defense:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "919A0505-167D-44E5-AF00-6C8C8742F2CF",
"versionEndIncluding": "4.14.2",
"versionStartIncluding": "4.0"
},
{
"criteria": "cpe:2.3:a:trellix:intelligent_sandbox:5.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9B53C628-EE8D-494C-81FA-D387BDC76972"
},
{
"criteria": "cpe:2.3:a:trellix:intelligent_sandbox:5.2:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CBE6B24B-6343-4F97-A363-6FEA58D4F8E2"
}
],
"operator": "OR"
}
]
}
]