Vulnerabilites related to Trellix - DXL Broker
cve-2022-2188
Vulnerability from cvelistv5
Published
2022-11-07 11:26
Modified
2024-08-03 00:32
Severity ?
EPSS score ?
Summary
Privilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Trellix | DXL Broker |
Version: 5.x < 6.0.0.280 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T00:32:08.819Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10383" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "defaultStatus": "unaffected", "platforms": [ "Windows" ], "product": "DXL Broker", "vendor": "Trellix", "versions": [ { "lessThan": "6.0.0.280", "status": "affected", "version": "5.x", "versionType": "custom" } ] } ], "descriptions": [ { "lang": "en", "supportingMedia": [ { "base64": false, "type": "text/html", "value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003ePrivilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker.\u003c/span\u003e\u003cbr\u003e" } ], "value": "Privilege escalation vulnerability in DXL Broker for Windows prior to 6.0.0.280 allows local users to gain elevated privileges by exploiting weak directory controls in the logs directory. This can lead to a denial-of-service attack on the DXL Broker.\n" } ], "impacts": [ { "capecId": "CAPEC-122", "descriptions": [ { "lang": "en", "value": "CAPEC-122 Privilege Abuse" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:N/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "description": "cwe-274: Privilege Escalation ", "lang": "en" } ] } ], "providerMetadata": { "dateUpdated": "2022-11-07T11:26:55.535Z", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix" }, "references": [ { "url": "https://kcm.trellix.com/corporate/index?page=content\u0026id=SB10383" } ], "source": { "discovery": "UNKNOWN" }, "title": "DXL Broker privilege escalation vulnerability", "x_generator": { "engine": "Vulnogram 0.1.0-dev" } } }, "cveMetadata": { "assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2022-2188", "datePublished": "2022-11-07T11:26:55.535Z", "dateReserved": "2022-06-23T14:51:26.656Z", "dateUpdated": "2024-08-03T00:32:08.819Z", "requesterUserId": "b1d09c6c-3425-4bda-a352-eb5ba05bc2f9", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }