Lucene search

K
cveTrellixCVE-2023-0400
HistoryFeb 02, 2023 - 9:15 a.m.

CVE-2023-0400

2023-02-0209:15:08
CWE-670
CWE-427
trellix
web.nvd.nist.gov
23
cve-2023-0400
protection bypass
dlp
windows 11.9.x
version 11.10.0
vulnerability

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

5.1%

The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.

Affected configurations

Nvd
Node
trellixdata_loss_preventionRange11.9.011.10.0
AND
microsoftwindowsMatch-
VendorProductVersionCPE
trellixdata_loss_prevention*cpe:2.3:a:trellix:data_loss_prevention:*:*:*:*:*:*:*:*
microsoftwindows-cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows"
    ],
    "product": "Data Loss Prevention (DLP)",
    "vendor": "Trellix",
    "versions": [
      {
        "lessThanOrEqual": "11.9.x",
        "status": "affected",
        "version": "11.9.100",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

8.2

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H

AI Score

7.8

Confidence

High

EPSS

0

Percentile

5.1%

Related for CVE-2023-0400