CVE-2023-0978
Published Mar 13, 2023
Last updated a year ago
Overview
- Description
- A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack
- Source
- trellixpsirt@trellix.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 6.7
- Impact score
- 5.9
- Exploitability score
- 0.8
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- MEDIUM
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:advanced_threat_defense:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "919A0505-167D-44E5-AF00-6C8C8742F2CF", "versionEndIncluding": "4.14.2", "versionStartIncluding": "4.0" }, { "criteria": "cpe:2.3:a:trellix:intelligent_sandbox:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B53C628-EE8D-494C-81FA-D387BDC76972" }, { "criteria": "cpe:2.3:a:trellix:intelligent_sandbox:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CBE6B24B-6343-4F97-A363-6FEA58D4F8E2" } ], "operator": "OR" } ] } ]