Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2024-0206


A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. This was achieved by adding an entry to the registry under the Trellix ENS registry folder with a symbolic link to files that the user wouldn't normally have permission to. After a scan, the Engine would follow the links and remove the files


Published

2024-01-09T14:15:46.550

Last Modified

2024-11-21T08:46:03.780

Status

Modified

Source

[email protected]

Severity

CVSSv3.1: 7.1 (HIGH)

Weaknesses
  • Type: Primary
    CWE-59

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application trellix anti-malware_engine 6600 Yes
Operating System microsoft windows - No

References