Trellix Agent
By the Year
In 2024 there have been 1 vulnerability in Trellix Agent with an average score of 7.8 out of ten. Last year Agent had 1 security vulnerability published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Agent in 2024 could surpass last years number. Last year, the average CVE base score was greater by 0.30
Year | Vulnerabilities | Average Score |
---|---|---|
2024 | 1 | 7.80 |
2023 | 1 | 8.10 |
2022 | 1 | 6.70 |
2021 | 0 | 0.00 |
2020 | 0 | 0.00 |
2019 | 0 | 0.00 |
2018 | 0 | 0.00 |
It may take a day or so for new Agent vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.
Recent Trellix Agent Security Vulnerabilities
A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1
CVE-2024-0213
7.8 - High
- January 09, 2024
A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly.
Classic Buffer Overflow
A heap-based overflow vulnerability in TA prior to version 5.7.9
CVE-2023-1388
8.1 - High
- June 07, 2023
A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable.
Memory Corruption
An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8
CVE-2022-3859
6.7 - Medium
- November 30, 2022
An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there.
DLL preloading
Stay on top of Security Vulnerabilities
Want an email whenever new vulnerabilities are published for Trellix Agent or by Trellix? Click the Watch button to subscribe.