CVE-2023-5607

8.4 HIGH

📋 TL;DR

This path traversal vulnerability in TACC ePO extension allows authenticated administrators to upload malicious GTI reputation files that can execute arbitrary code on on-premises ePO servers. Attackers need administrative privileges to exploit this vulnerability. The vulnerability affects ePO servers prior to version 8.4.0.

💻 Affected Systems

Products:
  • Trellix ePolicy Orchestrator (ePO) with TACC extension
Versions: All versions prior to 8.4.0
Operating Systems: Windows Server (primary deployment)
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects on-premises ePO deployments with TACC extension installed. Requires administrator privileges to exploit.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise with attacker gaining complete control over the ePO server, potentially leading to lateral movement across the network and data exfiltration.

🟠

Likely Case

Privileged administrator account compromise leading to unauthorized code execution on the ePO server, potentially affecting managed endpoints.

🟢

If Mitigated

Limited impact due to proper access controls and monitoring, with potential detection of unauthorized file upload attempts.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated administrator access to the ePO interface. The vulnerability is in file upload validation logic.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.4.0

Vendor Advisory: https://kcm.trellix.com/corporate/index?page=content&id=SB10411

Restart Required: Yes

Instructions:

1. Download ePO 8.4.0 from Trellix support portal. 2. Backup current ePO configuration and database. 3. Run the installer to upgrade to version 8.4.0. 4. Restart the ePO server and verify functionality.

🔧 Temporary Workarounds

Restrict GTI File Upload Access

all

Temporarily restrict administrator access to GTI reputation file upload functionality until patching can be completed.

Configure ePO role-based access control to remove GTI file upload permissions from administrator roles

🧯 If You Can't Patch

  • Implement strict monitoring of file upload activities in ePO logs and alert on any GTI reputation file uploads
  • Enforce principle of least privilege by reviewing and reducing administrator accounts with file upload capabilities

🔍 How to Verify

Check if Vulnerable:

Check ePO version in the web interface under Help > About ePolicy Orchestrator. If version is below 8.4.0, the system is vulnerable.

Check Version:

In ePO web interface: Help > About ePolicy Orchestrator

Verify Fix Applied:

Verify version shows 8.4.0 or higher in the ePO interface and test that GTI reputation file uploads are properly validated.

📡 Detection & Monitoring

Log Indicators:

  • Unusual GTI reputation file uploads
  • File upload attempts with suspicious filenames or paths
  • Administrator account performing unexpected file operations

Network Indicators:

  • Unusual outbound connections from ePO server following file uploads
  • Suspicious file transfer patterns to/from ePO server

SIEM Query:

source="epo_logs" AND (event="file_upload" OR event="gti_import") AND (filename CONTAINS ".." OR filename CONTAINS "/" OR filename CONTAINS "\")

🔗 References

📤 Share & Export