CVE-2023-6071

8.4 HIGH

📋 TL;DR

This vulnerability allows remote administrators to execute arbitrary code with root privileges on ESM systems by exploiting improper input sanitization when adding new data sources. Affected systems are ESM versions prior to 11.6.9 where administrators can access the data source configuration interface.

💻 Affected Systems

Products:
  • McAfee Enterprise Security Manager (ESM)
Versions: All versions prior to 11.6.9
Operating Systems: Linux-based ESM appliances
Default Config Vulnerable: ⚠️ Yes
Notes: Requires administrator access to the ESM web interface to exploit the data source configuration feature.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with root-level code execution, enabling data theft, lateral movement, persistence establishment, and system destruction.

🟠

Likely Case

Privilege escalation from administrator to root, enabling unauthorized access to sensitive data and system configuration changes.

🟢

If Mitigated

Limited impact with proper network segmentation and administrator access controls, potentially only affecting isolated ESM instances.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires administrator credentials but involves simple command injection techniques once authenticated.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.6.9 or later

Vendor Advisory: https://kcm.trellix.com/corporate/index?page=content&id=SB10413

Restart Required: Yes

Instructions:

1. Download ESM version 11.6.9 or later from the Trellix support portal. 2. Backup current configuration. 3. Apply the update following vendor documentation. 4. Restart the ESM service.

🔧 Temporary Workarounds

Restrict Administrator Access

all

Limit ESM administrator accounts to only trusted personnel and implement multi-factor authentication.

Network Segmentation

all

Isolate ESM management interface from general network access and restrict to specific administrative subnets.

🧯 If You Can't Patch

  • Implement strict access controls on ESM administrator accounts and monitor for suspicious activity.
  • Disable unnecessary data source configurations and restrict the data source management interface to essential personnel only.

🔍 How to Verify

Check if Vulnerable:

Check ESM version via web interface or command line. Versions below 11.6.9 are vulnerable.

Check Version:

esm_version_check or check via ESM web interface under System Information

Verify Fix Applied:

Confirm ESM version is 11.6.9 or higher and test data source configuration functionality.

📡 Detection & Monitoring

Log Indicators:

  • Unusual data source configuration changes
  • Command execution patterns in system logs
  • Multiple failed authentication attempts followed by successful admin login

Network Indicators:

  • Unusual outbound connections from ESM appliance
  • Traffic to unexpected ports from ESM management interface

SIEM Query:

source="esm_logs" AND (event_type="data_source_config" OR event_type="command_execution") AND user="admin"

🔗 References

📤 Share & Export