17/11/2023
2/8/2024
CVE-2023-5445
First published: Fri Nov 17 2023(Updated: )
An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit this the attacker must change the HTTP payload post submission, prior to it reaching the ePO server.
Credit: trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|
Trellix ePolicy Orchestrator | <5.10.0 | |
Trellix ePolicy Orchestrator | =5.10.0-service_pack_1_update | |
Trellix ePolicy Orchestrator | =5.10.0-service_pack_1_update_1 | |
Trellix ePolicy Orchestrator | =5.10.0-update_1 | |
Trellix ePolicy Orchestrator | =5.10.0-update_10 | |
Trellix ePolicy Orchestrator | =5.10.0-update_11 | |
Trellix ePolicy Orchestrator | =5.10.0-update_11_hotfix_1 | |
Trellix ePolicy Orchestrator | =5.10.0-update_11_hotfix_2 | |
Trellix ePolicy Orchestrator | =5.10.0-update_12 | |
Trellix ePolicy Orchestrator | =5.10.0-update_13 | |
Trellix ePolicy Orchestrator | =5.10.0-update_14 | |
Trellix ePolicy Orchestrator | =5.10.0-update_15 | |
Trellix ePolicy Orchestrator | =5.10.0-update_2 | |
Trellix ePolicy Orchestrator | =5.10.0-update_3 | |
Trellix ePolicy Orchestrator | =5.10.0-update_4 | |
Trellix ePolicy Orchestrator | =5.10.0-update_5 | |
Trellix ePolicy Orchestrator | =5.10.0-update_6 | |
Trellix ePolicy Orchestrator | =5.10.0-update_7 | |
Trellix ePolicy Orchestrator | =5.10.0-update_8 | |
Trellix ePolicy Orchestrator | =5.10.0-update_9 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2023-5445?
The severity of CVE-2023-5445 is medium with a CVSS score of 5.4.
How does CVE-2023-5445 impact ePolicy Orchestrator?
CVE-2023-5445 allows a remote low privileged user to modify the URL parameter and redirect URL requests to a malicious site in ePolicy Orchestrator.
Which versions of ePolicy Orchestrator are affected by CVE-2023-5445?
CVE-2023-5445 affects McAfee ePolicy Orchestrator versions up to 5.10.0 CP1 Update 2.
How can I fix CVE-2023-5445?
To fix CVE-2023-5445, users should update to ePolicy Orchestrator version 5.10.0 CP1 Update 2 or later.
Where can I find more information about CVE-2023-5445?
You can find more information about CVE-2023-5445 at the following link: [https://kcm.trellix.com/corporate/index?page=content&id=SB10410](https://kcm.trellix.com/corporate/index?page=content&id=SB10410).
- agent/type
- agent/event
- agent/softwarecombine
- agent/first-publish-date
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/weakness
- agent/references
- agent/severity
- agent/author
- agent/description
- agent/source
- agent/tags
- collector/nvd-api
- agent/software-canonical-lookup-request
- vendor/mcafee
- canonical/trellix epolicy orchestrator
- version/trellix epolicy orchestrator/5.10.0-service_pack_1_update
- version/trellix epolicy orchestrator/5.10.0-service_pack_1_update_1
- version/trellix epolicy orchestrator/5.10.0-update_1
- version/trellix epolicy orchestrator/5.10.0-update_10
- version/trellix epolicy orchestrator/5.10.0-update_11
- version/trellix epolicy orchestrator/5.10.0-update_11_hotfix_1
- version/trellix epolicy orchestrator/5.10.0-update_11_hotfix_2
- version/trellix epolicy orchestrator/5.10.0-update_12
- version/trellix epolicy orchestrator/5.10.0-update_13
- version/trellix epolicy orchestrator/5.10.0-update_14
- version/trellix epolicy orchestrator/5.10.0-update_15
- version/trellix epolicy orchestrator/5.10.0-update_2
- version/trellix epolicy orchestrator/5.10.0-update_3
- version/trellix epolicy orchestrator/5.10.0-update_4
- version/trellix epolicy orchestrator/5.10.0-update_5
- version/trellix epolicy orchestrator/5.10.0-update_6
- version/trellix epolicy orchestrator/5.10.0-update_7
- version/trellix epolicy orchestrator/5.10.0-update_8
- version/trellix epolicy orchestrator/5.10.0-update_9
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203