First published: Fri Jun 30 2023(Updated: )
In Malwarebytes EDR 1.0.11 for Linux, it is possible to bypass the detection layers that depend on inode identifiers, because an identifier may be reused when a file is replaced, and because two files on different filesystems can have the same identifier.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Malwarebytes Endpoint Detection and Response | <=1.0.11 | |
Malwarebytes Anti-Malware | <=1.0.14 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-29147 has been classified as a medium severity vulnerability.
To mitigate CVE-2023-29147, users should upgrade Malwarebytes EDR to version 1.0.12 or later.
CVE-2023-29147 affects Malwarebytes EDR versions up to 1.0.11 and Malwarebytes versions up to 1.0.14.
CVE-2023-29147 is a file detection bypass vulnerability in Malwarebytes EDR.
Yes, CVE-2023-29147 can potentially allow malware to evade detection on systems running the affected Malwarebytes software.