Vulnerability Details : CVE-2023-6119
An Improper Privilege Management vulnerability in Trellix GetSusp prior to version 5.0.0.27 allows a local, low privilege attacker to gain access to files that usually require a higher privilege level. This is caused by GetSusp not correctly protecting a directory that it creates during execution, allowing an attacker to take over file handles used by GetSusp. As this runs with high privileges, the attacker gains elevated permissions. The file handles are opened as read-only.
Products affected by CVE-2023-6119
- cpe:2.3:a:trellix:getsusp:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2023-6119
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2023-6119
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
2.0
|
4.0
|
Trellix |
CWE ids for CVE-2023-6119
-
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.Assigned by:
- nvd@nist.gov (Primary)
- trellixpsirt@trellix.com (Secondary)
References for CVE-2023-6119
-
https://kcm.trellix.com/corporate/index?page=content&id=SB10412
Security Bulletin - Trellix GetSusp update fixes one vulnerability (CVE-2023-6119)Vendor Advisory
Jump to