Vulnerability Description
An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege level. This is caused by GetSusp not correctly protecting a directory that it creates during execution, allowing an attacker to take over file handles used by GetSusp. As this runs with high privileges, the attacker gains elevated permissions. The file handles are opened as read-only.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Trellix | Getsusp | < 5.0.0.27 |
Related Weaknesses (CWE)
References
- https://kcm.trellix.com/corporate/index?page=content&id=SB10412Vendor Advisory
- https://kcm.trellix.com/corporate/index?page=content&id=SB10412Vendor Advisory
FAQ
What is CVE-2023-6119?
CVE-2023-6119 is a vulnerability with a CVSS score of 6.5 (MEDIUM). An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege leve...
How severe is CVE-2023-6119?
CVE-2023-6119 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-6119?
Check the references section above for vendor advisories and patch information. Affected products include: Trellix Getsusp.