First published: Tue Feb 13 2024(Updated: )
A cross-site scripting vulnerability in Trellix Central Management (CM) prior to 9.1.3.97129 allows a remote authenticated attacker to craft CM dashboard internal requests causing arbitrary content to be injected into the response when accessing the CM dashboard.
Credit: trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix Central Management System | <9.1.3.97129 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-6072 is classified as a cross-site scripting vulnerability that can allow an attacker to inject arbitrary content into the CM dashboard.
To fix CVE-2023-6072, upgrade Trellix Central Management to version 9.1.3.97129 or later.
CVE-2023-6072 affects Trellix Central Management System versions prior to 9.1.3.97129.
A remote authenticated attacker can exploit CVE-2023-6072 to perform cross-site scripting attacks on the CM dashboard.
The impact of CVE-2023-6072 includes the potential for attackers to inject malicious content into the responses accessed by users on the CM dashboard.