A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API and enables remote code execution through command injection, executed as the root user.
                
            References
                    | Link | Resource | 
|---|---|
| https://thrive.trellix.com/s/article/000014058#h2_0 | Permissions Required | 
| https://hackerone.com/reports/2817658 | Exploit Third Party Advisory | 
Configurations
                    History
                    28 Oct 2025, 18:34
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://thrive.trellix.com/s/article/000014058#h2_0 - Permissions Required | |
| References | () https://hackerone.com/reports/2817658 - Exploit, Third Party Advisory | |
| First Time | Trellix Trellix enterprise Security Manager | |
| CPE | cpe:2.3:a:trellix:enterprise_security_manager:11.6.10:*:*:*:*:*:*:* | 
18 Mar 2025, 15:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | 
 | |
| References | 
 | 
29 Nov 2024, 08:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2024-11-29 08:15
Updated : 2025-10-28 18:34
NVD link : CVE-2024-11482
Mitre link : CVE-2024-11482
CVE.ORG link : CVE-2024-11482
JSON object : View
Products Affected
                trellix
- enterprise_security_manager
CWE
                
                    
                        
                        CWE-78
                        
            Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
