We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-5956



Assignertrellix
Reserved2024-06-13
Published2024-09-05
Updated2024-09-05

Description

This vulnerability allows unauthenticated remote attackers to bypass authentication and gain partial data access to the vulnerable Trellix IPS Manager with garbage data in response mostly



MEDIUM: 6.5CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Problem types

CWE-305: Authentication Bypass by Primary Weakness

Product status

Default status
0x40035d9260

11.1.7.97
affected

Credits

Kentaro Kawane 0x40035d92a0

References

https://thrive.trellix.com/s/article/000013870

cve.org CVE-2024-5956

nvd.nist.gov CVE-2024-5956

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-5956
Subscribe to our newsletter to learn more about our work.