CVE-2023-3313

7.8 HIGH

📋 TL;DR

This vulnerability allows unauthorized users to execute arbitrary system commands through improper input sanitization in the ESM certificate API. Attackers could escalate privileges or run malicious commands on affected systems. Organizations using vulnerable versions of the affected software are at risk.

💻 Affected Systems

Products:
  • Trellix ESM (Enterprise Security Manager)
Versions: Versions prior to 11.7.0
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: Affects ESM installations with certificate API enabled. Default configurations are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with administrative privileges, data exfiltration, lateral movement across network, and persistent backdoor installation.

🟠

Likely Case

Privilege escalation leading to unauthorized access to sensitive systems and data, potentially enabling further attacks within the environment.

🟢

If Mitigated

Limited impact due to network segmentation, least privilege access controls, and proper input validation at other layers.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires some level of access to the ESM certificate API. The vulnerability is in input sanitization, making exploitation relatively straightforward for attackers with API access.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.7.0 and later

Vendor Advisory: https://kcm.trellix.com/corporate/index?page=content&id=SB10403

Restart Required: Yes

Instructions:

1. Download ESM version 11.7.0 or later from Trellix support portal. 2. Backup current configuration and data. 3. Install the update following vendor documentation. 4. Restart ESM services. 5. Verify successful update and functionality.

🔧 Temporary Workarounds

Disable Certificate API

all

Temporarily disable the vulnerable certificate API endpoint until patching can be completed.

# Consult Trellix documentation for specific API disablement procedures

Network Access Control

all

Restrict network access to ESM certificate API endpoints using firewall rules.

# Example: iptables -A INPUT -p tcp --dport [ESM_API_PORT] -j DROP
# Windows: netsh advfirewall firewall add rule name="Block ESM API" dir=in action=block protocol=TCP localport=[ESM_API_PORT]

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate ESM systems from critical assets
  • Apply additional input validation and sanitization at the application layer

🔍 How to Verify

Check if Vulnerable:

Check ESM version via admin console or command line. Versions below 11.7.0 are vulnerable.

Check Version:

On ESM server: esm_version or check via ESM admin interface

Verify Fix Applied:

Verify ESM version is 11.7.0 or higher and test certificate API functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual certificate API requests
  • Suspicious command execution patterns in system logs
  • Failed authentication attempts followed by API access

Network Indicators:

  • Unusual traffic to ESM certificate API ports
  • Suspicious payloads in API requests

SIEM Query:

source="esm_logs" AND (api="certificate" AND (command="*" OR shell="*" OR exec="*"))

🔗 References

📤 Share & Export