Hardcoded credentials vulnerability in Trellix ePolicy...
High severity
Unreviewed
Published
May 16, 2024
to the GitHub Advisory Database
•
Updated May 16, 2024
Description
Published by the National Vulnerability Database
May 16, 2024
Published to the GitHub Advisory Database
May 16, 2024
Last updated
May 16, 2024
Hardcoded credentials vulnerability in Trellix ePolicy Orchestrator (ePO) on Premise prior to 5.10 Service Pack 1 Update 2 allows an attacker with admin privileges on the ePO server to read the contents of the orion.keystore file, allowing them to access the ePO database encryption key. This was possible through using a hard coded password for the keystore. Access Control restrictions on the file mean this would not be exploitable unless the user is the system admin for the server that ePO is running on.
References