A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API and enables remote code execution through command injection, executed as the root user.
References
| Link | Resource |
|---|---|
| https://thrive.trellix.com/s/article/000014058#h2_0 | Permissions Required |
| https://hackerone.com/reports/2817658 | Exploit Third Party Advisory |
Configurations
History
28 Oct 2025, 18:34
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://thrive.trellix.com/s/article/000014058#h2_0 - Permissions Required | |
| References | () https://hackerone.com/reports/2817658 - Exploit, Third Party Advisory | |
| First Time |
Trellix
Trellix enterprise Security Manager |
|
| CPE | cpe:2.3:a:trellix:enterprise_security_manager:11.6.10:*:*:*:*:*:*:* |
18 Mar 2025, 15:15
| Type | Values Removed | Values Added |
|---|---|---|
| Summary |
|
|
| References |
|
29 Nov 2024, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-11-29 08:15
Updated : 2025-10-28 18:34
NVD link : CVE-2024-11482
Mitre link : CVE-2024-11482
CVE.ORG link : CVE-2024-11482
JSON object : View
Products Affected
trellix
- enterprise_security_manager
CWE
CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
