Trellix Epolicy Orchestrator vulnerabilities
4 known vulnerabilities affecting trellix/epolicy_orchestrator.
Total CVEs
4
CISA KEV
0
Public exploits
0
Exploited in wild
0
Severity breakdown
HIGH2MEDIUM2
Vulnerabilities
Page 1 of 1
CVE-2024-4844HIGHCVSS 7.5vAll versions below ePO 5.10 Service Pack 1 Update 22024-05-16
CVE-2024-4844 [HIGH] CWE-798 CVE-2024-4844: Hardcoded credentials vulnerability in Trellix ePolicy Orchestrator (ePO) on Premise prior to 5.10 S
Hardcoded credentials vulnerability in Trellix ePolicy Orchestrator (ePO) on Premise prior to 5.10 Service Pack 1 Update 2 allows an attacker with admin privileges on the ePO server to read the contents of the orion.keystore file, allowing them to access the ePO database encryption key. This was possible through using a hard coded password for the keyst
cvelistv5nvd
CVE-2024-4843MEDIUMCVSS 4.3vversions previous to ePO 5.10 Service Pack 1 Update 22024-05-16
CVE-2024-4843 [MEDIUM] CWE-639 CVE-2024-4843: ePO doesn't allow a regular privileged user to delete tasks or assignments. Insecure direct object r
ePO doesn't allow a regular privileged user to delete tasks or assignments. Insecure direct object references that allow a least privileged user to manipulate the client task and client task assignments, hence escalating his/her privilege.
cvelistv5nvd
CVE-2023-5444HIGHCVSS 8.0vPrior to 5.10.0 SP1 UP22023-11-17
CVE-2023-5444 [HIGH] CWE-352 CVE-2023-5444:
A Cross Site Request Forgery vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2 all
A Cross Site Request Forgery vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2 allows a remote low privilege user to successfully add a new user with administrator privileges to the ePO server. This impacts the dashboard area of the user interface. To exploit this the attacker must change the HTTP payload post submission, prior to it re
cvelistv5nvd
CVE-2023-5445MEDIUMCVSS 5.4vPrior to 5.10.0 SP1 UP22023-11-17
CVE-2023-5445 [MEDIUM] CWE-601 CVE-2023-5445:
An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remot
An open redirect vulnerability in ePolicy Orchestrator prior to 5.10.0 CP1 Update 2, allows a remote low privileged user to modify the URL parameter for the purpose of redirecting URL request(s) to a malicious site. This impacts the dashboard area of the user interface. A user would need to be logged into ePO to trigger this vulnerability. To exploit
cvelistv5nvd