First published: Wed Feb 01 2023(Updated: )
The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.
Credit: trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix Data Loss Prevention | >=11.9.0<11.10.0 | |
Microsoft Windows |
Customers should upgrade to version 11.10.0.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-0400 is a protection bypass vulnerability in DLP for Windows 11.9.x.
CVE-2023-0400 allows a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client, while loading from a local drive is correctly prevented.
Yes, versions of Trellix Data Loss Prevention prior to 11.9 are affected by CVE-2023-0400.
You can address CVE-2023-0400 by updating Trellix Data Loss Prevention to version 11.10.0.
CVE-2023-0400 has a severity score of 8.2 (high).