Agent Trellix Agent

Do you want an email whenever new security vulnerabilities are reported in Trellix Agent?

By the Year

In 2024 there have been 1 vulnerability in Trellix Agent with an average score of 7.8 out of ten. Last year Agent had 1 security vulnerability published. If vulnerabilities keep coming in at the current rate, it appears that number of security vulnerabilities in Agent in 2024 could surpass last years number. Last year, the average CVE base score was greater by 0.30

Year Vulnerabilities Average Score
2024 1 7.80
2023 1 8.10
2022 1 6.70
2021 0 0.00
2020 0 0.00
2019 0 0.00
2018 0 0.00

It may take a day or so for new Agent vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Trellix Agent Security Vulnerabilities

A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1

CVE-2024-0213 7.8 - High - January 09, 2024

A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly.

Classic Buffer Overflow

A heap-based overflow vulnerability in TA prior to version 5.7.9

CVE-2023-1388 8.1 - High - June 07, 2023

A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable.

Memory Corruption

An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8

CVE-2022-3859 6.7 - Medium - November 30, 2022

An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there.

DLL preloading

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Trellix Agent or by Trellix? Click the Watch button to subscribe.

Trellix
Vendor

Trellix Agent
Product

subscribe