Vulnerability Description
In Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files on different filesystems can have the same identifier.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Malwarebytes | Endpoint Detection And Response | <= 1.0.11 |
| Malwarebytes | Malwarebytes | <= 1.0.14 |
Related Weaknesses (CWE)
References
- https://malwarebytes.comProduct
- https://www.malwarebytes.com/secure/cves/cve-2023-29147Vendor Advisory
- https://malwarebytes.comProduct
- https://www.malwarebytes.com/secure/cves/cve-2023-29147Vendor Advisory
FAQ
What is CVE-2023-29147?
CVE-2023-29147 is a vulnerability with a CVSS score of 5.5 (MEDIUM). In Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files...
How severe is CVE-2023-29147?
CVE-2023-29147 has been rated MEDIUM with a CVSS base score of 5.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-29147?
Check the references section above for vendor advisories and patch information. Affected products include: Malwarebytes Endpoint Detection And Response, Malwarebytes Malwarebytes.