CVE-2025-0617

5.9 MEDIUM

📋 TL;DR

This XML entity expansion vulnerability in HX 10.0.0 and earlier allows attackers to cause denial of service by sending specially crafted data to the HX console. The malicious XML triggers exponential entity expansions during file parsing, consuming excessive resources and crashing the consumer process. Organizations using affected HX versions are vulnerable.

💻 Affected Systems

Products:
  • Trellix HX
Versions: 10.0.0 and earlier versions
Operating Systems: Not OS-specific - affects HX application
Default Config Vulnerable: ⚠️ Yes
Notes: Affects the HX console component specifically when processing XML data.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete denial of service for the HX console, disrupting security monitoring and incident response capabilities.

🟠

Likely Case

Temporary service disruption requiring process restart, potentially affecting security operations.

🟢

If Mitigated

Minimal impact with proper network segmentation and access controls limiting attack surface.

🌐 Internet-Facing: MEDIUM - If HX console is exposed to untrusted networks, attackers could disrupt security monitoring.
🏢 Internal Only: MEDIUM - Internal attackers or compromised systems could disrupt security operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires access to send data to HX console, but XML entity expansion attacks are well-understood and relatively simple to execute.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: HX 10.0.1 or later

Vendor Advisory: https://thrive.trellix.com/s/article/000014214

Restart Required: Yes

Instructions:

1. Download HX 10.0.1 or later from Trellix support portal. 2. Backup current configuration. 3. Install the update following vendor documentation. 4. Restart HX services.

🔧 Temporary Workarounds

XML Parsing Limits

all

Configure XML parser to limit entity expansion depth and size

Network Access Restriction

all

Restrict network access to HX console to trusted sources only

🧯 If You Can't Patch

  • Implement strict network segmentation to limit access to HX console
  • Deploy WAF or IPS with XML entity expansion protection rules

🔍 How to Verify

Check if Vulnerable:

Check HX version via console interface or command: hx version

Check Version:

hx version

Verify Fix Applied:

Verify version is 10.0.1 or later and test XML processing functionality

📡 Detection & Monitoring

Log Indicators:

  • High memory/CPU usage in HX consumer process
  • Process crashes or restarts
  • XML parsing errors

Network Indicators:

  • Unusual XML traffic to HX console
  • Large XML payloads with entity references

SIEM Query:

source="hx_logs" AND ("out of memory" OR "process crash" OR "XML parsing error")

🔗 References

📤 Share & Export