A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API. This leads to improper handling of path traversal, insecure forwarding to an AJP backend without adequate validation, and lack of authentication for accessing internal API endpoints.
                
            References
                    | Link | Resource | 
|---|---|
| https://thrive.trellix.com/s/article/000014058 | Permissions Required | 
Configurations
                    History
                    28 Oct 2025, 18:37
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:trellix:enterprise_security_manager:11.6.10:*:*:*:*:*:*:* | |
| Summary | 
 | |
| First Time | Trellix Trellix enterprise Security Manager | |
| References | () https://thrive.trellix.com/s/article/000014058 - Permissions Required | 
29 Nov 2024, 08:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-29 08:15
Updated : 2025-10-28 18:37
NVD link : CVE-2024-11481
Mitre link : CVE-2024-11481
CVE.ORG link : CVE-2024-11481
JSON object : View
Products Affected
                trellix
- enterprise_security_manager
CWE
                
                    
                        
                        CWE-22
                        
            Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
