CVE-2024-11482

A vulnerability in ESM 11.6.10 allows unauthenticated access to the internal Snowservice API and enables remote code execution through command injection, executed as the root user.
References
Link Resource
https://thrive.trellix.com/s/article/000014058#h2_0 Permissions Required
https://hackerone.com/reports/2817658 Exploit Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:trellix:enterprise_security_manager:11.6.10:*:*:*:*:*:*:*

History

28 Oct 2025, 18:34

Type Values Removed Values Added
First Time Trellix
Trellix enterprise Security Manager
References () https://thrive.trellix.com/s/article/000014058#h2_0 - () https://thrive.trellix.com/s/article/000014058#h2_0 - Permissions Required
References () https://hackerone.com/reports/2817658 - () https://hackerone.com/reports/2817658 - Exploit, Third Party Advisory
CPE cpe:2.3:a:trellix:enterprise_security_manager:11.6.10:*:*:*:*:*:*:*

18 Mar 2025, 15:15

Type Values Removed Values Added
Summary
  • (es) Una vulnerabilidad en ESM 11.6.10 permite el acceso no autenticado a la API interna de Snowservice y habilita la ejecución remota de código a través de la inyección de comandos, ejecutados como usuario superusuario.
References
  • () https://hackerone.com/reports/2817658 -

29 Nov 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-11-29 08:15

Updated : 2025-10-28 18:34


NVD link : CVE-2024-11482

Mitre link : CVE-2024-11482

CVE.ORG link : CVE-2024-11482


JSON object : View

Products Affected

trellix

  • enterprise_security_manager
CWE
CWE-78

Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')