trellix CVE Vulnerabilities & Metrics

Focus on trellix vulnerabilities and metrics.

Last updated: 08 Mar 2025, 23:25 UTC

About trellix Security Exposure

This page consolidates all known Common Vulnerabilities and Exposures (CVEs) associated with trellix. We track both calendar-based metrics (using fixed periods) and rolling metrics (using gliding windows) to give you a comprehensive view of security trends and risk evolution. Use these insights to assess risk and plan your patching strategy.

For a broader perspective on cybersecurity threats, explore the comprehensive list of CVEs by vendor and product. Stay updated on critical vulnerabilities affecting major software and hardware providers.

Global CVE Overview

Total trellix CVEs: 20
Earliest CVE date: 04 Nov 2022, 12:15 UTC
Latest CVE date: 05 Sep 2024, 11:15 UTC

Latest CVE reference: CVE-2024-5957

Rolling Stats

30-day Count (Rolling): 0
365-day Count (Rolling): 2

Calendar-based Variation

Calendar-based Variation compares a fixed calendar period (e.g., this month versus the same month last year), while Rolling Growth Rate uses a continuous window (e.g., last 30 days versus the previous 30 days) to capture trends independent of calendar boundaries.

Variations & Growth

Month Variation (Calendar): 0%
Year Variation (Calendar): -85.71%

Month Growth Rate (30-day Rolling): 0.0%
Year Growth Rate (365-day Rolling): -85.71%

Monthly CVE Trends (current vs previous Year)

Annual CVE Trends (Last 20 Years)

Critical trellix CVEs (CVSS ≥ 9) Over 20 Years

CVSS Stats

Average CVSS: 0.0

Max CVSS: 0

Critical CVEs (≥9): 0

CVSS Range vs. Count

Range Count
0.0-3.9 20
4.0-6.9 0
7.0-8.9 0
9.0-10.0 0

CVSS Distribution Chart

Top 5 Highest CVSS trellix CVEs

These are the five CVEs with the highest CVSS scores for trellix, sorted by severity first and recency.

All CVEs for trellix

CVE-2024-5957 trellix vulnerability CVSS: 0 05 Sep 2024, 11:15 UTC

This vulnerability allows unauthenticated remote attackers to bypass authentication and gain APIs access of the Manager.

CVE-2024-5956 trellix vulnerability CVSS: 0 05 Sep 2024, 11:15 UTC

This vulnerability allows unauthenticated remote attackers to bypass authentication and gain partial data access to the vulnerable Trellix IPS Manager with garbage data in response mostly

CVE-2024-0310 trellix vulnerability CVSS: 0 10 Jan 2024, 11:15 UTC

A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration.

CVE-2024-0213 trellix vulnerability CVSS: 0 09 Jan 2024, 14:15 UTC

A buffer overflow vulnerability in TA for Linux and TA for MacOS prior to 5.8.1 allows a local user to gain elevated permissions, or cause a Denial of Service (DoS), through exploiting a memory corruption issue in the TA service, which runs as root. This may also result in the disabling of event reporting to ePO, caused by failure to validate input from the file correctly.

CVE-2024-0206 trellix vulnerability CVSS: 0 09 Jan 2024, 14:15 UTC

A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. This was achieved by adding an entry to the registry under the Trellix ENS registry folder with a symbolic link to files that the user wouldn't normally have permission to. After a scan, the Engine would follow the links and remove the files

CVE-2023-6071 trellix vulnerability CVSS: 0 30 Nov 2023, 13:15 UTC

An Improper Neutralization of Special Elements used in a command vulnerability in ESM prior to version 11.6.9 allows a remote administrator to execute arbitrary code as root on the ESM. This is possible as the input isn't correctly sanitized when adding a new data source.

CVE-2023-6070 trellix vulnerability CVSS: 0 29 Nov 2023, 09:15 UTC

A server-side request forgery vulnerability in ESM prior to version 11.6.8 allows a low privileged authenticated user to upload arbitrary content, potentially altering configuration. This is possible through the certificate validation functionality where the API accepts uploaded content and doesn't parse for invalid data

CVE-2023-5607 trellix vulnerability CVSS: 0 27 Nov 2023, 11:15 UTC

An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content.

CVE-2023-4814 trellix vulnerability CVSS: 0 14 Sep 2023, 07:15 UTC

A Privilege escalation vulnerability exists in Trellix Windows DLP endpoint for windows which can be abused to delete any file/folder for which the user does not have permission to.

CVE-2023-3314 trellix vulnerability CVSS: 0 03 Jul 2023, 09:15 UTC

A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges.

CVE-2023-3313 trellix vulnerability CVSS: 0 03 Jul 2023, 08:15 UTC

An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.

CVE-2023-1388 trellix vulnerability CVSS: 0 07 Jun 2023, 08:15 UTC

A heap-based overflow vulnerability in TA prior to version 5.7.9 allows a remote user to alter the page heap in the macmnsvc process memory block, resulting in the service becoming unavailable.

CVE-2023-0976 trellix vulnerability CVSS: 0 07 Jun 2023, 08:15 UTC

A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree.

CVE-2023-0977 trellix vulnerability CVSS: 0 03 Apr 2023, 16:15 UTC

A heap-based overflow vulnerability in Trellix Agent (Windows and Linux) version 5.7.8 and earlier, allows a remote user to alter the page heap in the macmnsvc process memory block resulting in the service becoming unavailable.

CVE-2023-0975 trellix vulnerability CVSS: 0 03 Apr 2023, 16:15 UTC

A vulnerability exists in Trellix Agent for Windows version 5.7.8 and earlier, that allows local users, during install/upgrade workflow, to replace one of the Agent’s executables before it can be executed. This allows the user to elevate their permissions.

CVE-2023-0978 trellix vulnerability CVSS: 0 13 Mar 2023, 14:15 UTC

A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack

CVE-2023-0400 trellix vulnerability CVSS: 0 02 Feb 2023, 09:15 UTC

The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.

CVE-2023-0214 trellix vulnerability CVSS: 0 18 Jan 2023, 11:15 UTC

A cross-site scripting vulnerability in Skyhigh SWG in main releases 11.x prior to 11.2.6, 10.x prior to 10.2.17, and controlled release 12.x prior to 12.0.1 allows a remote attacker to craft SWG-specific internal requests with URL paths to any third-party website, causing arbitrary content to be injected into the response when accessed through SWG.

CVE-2022-3859 trellix vulnerability CVSS: 0 30 Nov 2022, 09:15 UTC

An uncontrolled search path vulnerability exists in Trellix Agent (TA) for Windows in versions prior to 5.7.8. This allows an attacker with admin access, which is required to place the DLL in the restricted Windows System folder, to elevate their privileges to System by placing a malicious DLL there.

CVE-2022-3340 trellix vulnerability CVSS: 0 04 Nov 2022, 12:15 UTC

XML External Entity (XXE) vulnerability in Trellix IPS Manager prior to 10.1 M8 allows a remote authenticated administrator to perform XXE attack in the administrator interface part of the interface, which allows a saved XML configuration file to be imported.