Vulnerability Description
An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trellix | Enterprise Security Manager | < 11.6.9 |
Related Weaknesses (CWE)
References
- https://kcm.trellix.com/corporate/index?page=content&id=SB10413Vendor Advisory
- https://kcm.trellix.com/corporate/index?page=content&id=SB10413Vendor Advisory
FAQ
What is CVE-2023-6071?
CVE-2023-6071 is a vulnerability with a CVSS score of 8.4 (HIGH). An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possi...
How severe is CVE-2023-6071?
CVE-2023-6071 has been rated HIGH with a CVSS base score of 8.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6071?
Check the references section above for vendor advisories and patch information. Affected products include: Trellix Enterprise Security Manager.