Vulnerability Description
A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trellix | Enterprise Security Manager | < 11.6.8 |
Related Weaknesses (CWE)
References
- https://kcm.trellix.com/corporate/index?page=content&id=SB10413Vendor Advisory
- https://kcm.trellix.com/corporate/index?page=content&id=SB10413Vendor Advisory
FAQ
What is CVE-2023-6070?
CVE-2023-6070 is a vulnerability with a CVSS score of 4.3 (MEDIUM). A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible...
How severe is CVE-2023-6070?
CVE-2023-6070 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6070?
Check the references section above for vendor advisories and patch information. Affected products include: Trellix Enterprise Security Manager.