Security Bulletin – Trellix Intelligent Sandbox update fixes one vulnerability (CVE-2023-0978)
Last Modified: 2023-03-07 16:02:12 Etc/GMT
Trellix CEO, Bryan Palma, explains the critical need for security that’s always learning.
As per Gartner, "XDR is an emerging technology that can offer improved threat prevention, detection and response."
Trellix announced the establishment of the Trellix Advanced Research Center to advance global threat intelligence.
Trellix Advanced Research Center analyzes threat data on ransomware, nation-states, sectors, vectors, LotL, MITRE ATT&CK techniques, and emails.
After December 1, 2024, please log in to the Thrive Portal for support, knowledge articles, tools, and downloads. For information about using the Thrive Portal, view the Trellix Thrive Portal User Guide.
Security Bulletin – Trellix Intelligent Sandbox update fixes one vulnerability (CVE-2023-0978)
Security Bulletins ID:
SB10397
Last Modified: 2023-03-07 16:02:12 Etc/GMT Summary
First Published: March 7, 2023
{GENSUB.EN_US} Article contents:
A command injection vulnerability in Trellix Intelligent Sandbox CLI allows a local user to obtain root access. CVE-2023-0978 A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attacker to execute arbitrary commands on the underlying operating system and gain root privileges. Remediation To remediate this issue, customers running ATD/IS 5.2.0 or earlier must go to the Product Downloads site and download the applicable product update/hotfix file:
Download and Installation Instructions For instructions to download product updates and hotfixes, see: KB56057 - How to download product updates and documentation. Product Specific Notes You can apply the patch from either the CLI or GUI. Download the patch:
Workaround No workarounds are available. We strongly recommend that you install the available security patch. Mitigations No signatures are available. Acknowledgments Trellix credits Derrick Berg from Eastman Kodak Company for responsibly reporting these vulnerabilities. Frequently Asked Questions (FAQs) How do I know if my product is vulnerable or not? If you are using ATD 4.x or IS 5.2.0 and earlier, your device is vulnerable to this CVE. What is CVSS? Common Vulnerability Scoring System (CVSS) is the result of the National Infrastructure Advisory Council's effort to standardize a system of assessing the criticality of a vulnerability. This system offers an unbiased criticality score between 0 and 10 that customers can use to judge how critical a vulnerability is and plan accordingly. For more information, visit the CVSS website. When calculating CVSS scores, we have adopted a philosophy that fosters consistency and repeatability. Our guiding principle for CVSS scoring is to score the exploit under consideration by itself. We consider only the immediate and direct impact of the exploit under consideration. We don’t factor into a score any potential follow-on exploits that might be made possible by the successful exploitation of the issue being scored. What are the CVSS scoring metrics?
Resources {GENAA.EN_US} Disclaimer {SB_DISCLAIMER.EN_US} |
|