CVEInsight.
TrendingZero-DayExploreBrowseSearchSaved
CVEInsight.

Free vulnerability intelligence for developers, security teams, and researchers. Data sourced from public databases for informational purposes only.

Explore

HomeTrendingZero-Day WatchAttack TypesBrowse CVEsSearch

Legal

Privacy PolicyTerms of ServiceData Disclaimer

© 2026CVEInsight. For informational use only — not a substitute for professional security advice.

CVE data sourced from NVD / NIST & public disclosures.

Search Vulnerabilities

 Software

Searching vulnerabilities affecting “trellix”

32 vulnerabilities found for “trellix”

Page 1 of 2

CVE-2025-14963
HIGH7.8

A vulnerability identified in the HX Agent driver file fekern.sys allowed a threat actor with local user access the ability to gain elevated system privileges. Utilization of a Bring Your Own Vulnerable Driver (BYOVD) was leveraged to gain access to the critical Windows process memory lsass.exe (Local Security Authority Subsystem Service). The fekern.sys is a driver file associated with the HX Agent (used in all existing HX Agent versions). The vulnerable driver installed in a product or a system running a fully functional HX Agent is, itself, not exploitable as the product’s tamper protection restricts the ability to communicate with the driver to only the Agent’s processes.

trellix / endpoint_security+2
Local
Published Feb 24, 2026
Page 1 of 2
CVE-2025-3771
HIGH7.1

A path or symbolic link manipulation vulnerability in SIR 1.0.3 and prior versions allows an authenticated non-admin local user to overwrite system files with SIR backup files, which can potentially cause a system crash. This was achieved by adding a malicious entry to the registry under the Trellix SIR registry folder or via policy or with a junction symbolic link to files that the user would not normally have permission to acces

trellix / system_information_reporter
Local
Published Jun 26, 2025
CVE-2025-3773
MEDIUM5.5

A sensitive information exposure vulnerability in System Information Reporter (SIR) 1.0.3 and prior allows an authenticated non-admin local user to extract sensitive information stored in a registry backup folder.

trellix / system_information_reporter
Local
Published Jun 26, 2025
CVE-2025-3722
MEDIUM4.4

A path traversal vulnerability in System Information Reporter (SIR) 1.0.3 and prior allowed an authenticated high privileged user to issue malicious ePO post requests to System Information Reporter, leading to creation of files anywhere on the filesystem and possibly overwriting existing files and exposing sensitive information disclosure.

trellix / system_information_reporter
Local
Published Jun 26, 2025
CVE-2024-5957
MEDIUM6.3

This vulnerability allows unauthenticated remote attackers to bypass authentication and gain APIs access of the Manager.

trellix / intrusion_prevention_system_manager
Network
Published Sep 5, 2024
CVE-2024-5956
MEDIUM6.5

This vulnerability allows unauthenticated remote attackers to bypass authentication and gain partial data access to the vulnerable Trellix IPS Manager with garbage data in response mostly

trellix / intrusion_prevention_system_manager
Network
Published Sep 5, 2024
CVE-2024-4176
MEDIUM4.1

An Cross site scripting vulnerability in the EDR XConsole before this release allowed an attacker to potentially leverage an XSS/HTML-Injection using command line variables. A malicious threat actor could execute commands on the victim's browser for sending carefully crafted malicious links to the EDR XConsole end user.

trellix / xconsole
Network
Published Jun 13, 2024
CVE-2023-6072
MEDIUM4.6

A cross-site scripting vulnerability in Trellix Central Management (CM) prior to 9.1.3.97129 allows a remote authenticated attacker to craft CM dashboard internal requests causing arbitrary content to be injected into the response when accessing the CM dashboard.

trellix / central_management_system
Network
Published Feb 13, 2024
CVE-2024-0310
MEDIUM6.1

A content-security-policy vulnerability in ENS Control browser extension prior to 10.7.0 Update 15 allows a remote attacker to alter the response header parameter setting to switch the content security policy into report-only mode, allowing an attacker to bypass the content-security-policy configuration.

trellix / endpoint_security_web_control+1
Network
Published Jan 10, 2024
CVE-2024-0206
HIGH7.1

A symbolic link manipulation vulnerability in Trellix Anti-Malware Engine prior to the January 2024 release allows an authenticated local user to potentially gain an escalation of privileges. This was achieved by adding an entry to the registry under the Trellix ENS registry folder with a symbolic link to files that the user wouldn't normally have permission to. After a scan, the Engine would follow the links and remove the files

trellix / anti-malware_engine
Local
Published Jan 9, 2024
CVE-2023-5607
HIGH8.4

An improper limitation of a path name to a restricted directory (path traversal) vulnerability in the TACC ePO extension, for on-premises ePO servers, prior to version 8.4.0 could lead to an authorised administrator attacker executing arbitrary code through uploading a specially crafted GTI reputation file. The attacker would need the appropriate privileges to access the relevant section of the User Interface. The import logic has been updated to restrict file types and content.

trellix / application_and_change_control
Network
Published Nov 27, 2023
CVE-2023-3665
MEDIUM5.5

A code injection vulnerability in Trellix ENS 10.7.0 April 2023 release and earlier, allowed a local user to disable the ENS AMSI component via environment variables, leading to denial of service and or the execution of arbitrary code.

trellix / endpoint_security
Local
Published Oct 4, 2023
CVE-2023-4814
HIGH7.1

A Privilege escalation vulnerability exists in Trellix Windows DLP endpoint for windows which can be abused to delete any file/folder for which the user does not have permission to.

trellix / data_loss_prevention
Local
Published Sep 14, 2023
CVE-2023-3314
HIGH8.1

A vulnerability arises out of a failure to comprehensively sanitize the processing of a zip file(s). Incomplete neutralization of external commands used to control the process execution of the .zip application allows an authorized user to obtain control of the .zip application to execute arbitrary commands or obtain elevation of system privileges.

trellix / enterprise_security_manager
Network
Published Jul 3, 2023
CVE-2023-3438
MEDIUM4.4

An unquoted Windows search path vulnerability existed in the install the MOVE 4.10.x and earlier Windows install service (mvagtsce.exe). The misconfiguration allowed an unauthorized local user to insert arbitrary code into the unquoted service path to obtain privilege escalation and stop antimalware services.

trellix / move
Local
Published Jul 3, 2023
CVE-2023-3313
HIGH7.8

An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.

trellix / enterprise_security_manager
Local
Published Jul 3, 2023
CVE-2023-0978
MEDIUM6.4

A command injection vulnerability in Trellix Intelligent Sandbox CLI for version 5.2 and earlier, allows a local user to inject and execute arbitrary operating system commands using specially crafted strings. This vulnerability is due to insufficient validation of arguments that are passed to specific CLI command. The vulnerability allows the attack

mcafee / advanced_threat_defense+2
Local
Published Mar 13, 2023
CVE-2023-0400
MEDIUM5.9

The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.

trellix / data_loss_prevention
Local
Published Feb 2, 2023
CVE-2022-4326
MEDIUM5.5

Improper preservation of permissions vulnerability in Trellix Endpoint Agent (xAgent) prior to V35.31.22 on Windows allows a local user with administrator privileges to bypass the product protection to uninstall the agent via incorrectly applied permissions in the removal protection functionality.

trellix / endpoint_security
Local
Published Dec 16, 2022
CVE-2022-3340
MEDIUM5.9

XML External Entity (XXE) vulnerability in Trellix IPS Manager prior to 10.1 M8 allows a remote authenticated administrator to perform XXE attack in the administrator interface part of the interface, which allows a saved XML configuration file to be imported.

trellix / intrusion_prevention_system_manager+2
Network
Published Nov 4, 2022