A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API. This leads to improper handling of path traversal, insecure forwarding to an AJP backend without adequate validation, and lack of authentication for accessing internal API endpoints.
References
| Link | Resource |
|---|---|
| https://thrive.trellix.com/s/article/000014058 | Permissions Required |
Configurations
History
28 Oct 2025, 18:37
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:trellix:enterprise_security_manager:11.6.10:*:*:*:*:*:*:* | |
| First Time |
Trellix
Trellix enterprise Security Manager |
|
| Summary |
|
|
| References | () https://thrive.trellix.com/s/article/000014058 - Permissions Required |
29 Nov 2024, 08:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2024-11-29 08:15
Updated : 2025-10-28 18:37
NVD link : CVE-2024-11481
Mitre link : CVE-2024-11481
CVE.ORG link : CVE-2024-11481
JSON object : View
Products Affected
trellix
- enterprise_security_manager
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
