CVE-2023-0400 Vulnerability Details

  /     /     /  

CVE-2023-0400 Metadata Quick Info

CVE Published: 01/02/2023 | CVE Updated: 02/08/2024 | CVE Year: 2023
Source: trellix | Vendor: Trellix | Product: Data Loss Prevention (DLP)
Status : PUBLISHED

CVE-2023-0400 Description

The protection bypass vulnerability in DLP for Windows 11.9.x is addressed in version 11.10.0. This allowed a local user to bypass DLP controls when uploading sensitive data from a mapped drive into a web email client. Loading from a local driver was correctly prevented. Versions prior to 11.9 correctly detected and blocked the attempted upload of sensitive data.

Metrics

CVSS Version: 3.1 | Base Score: 5.9 MEDIUM
Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:N

l➤ Exploitability Metrics:
    Attack Vector (AV)* LOCAL
    Attack Complexity (AC)* LOW
    Privileges Required (PR)* LOW
    User Interaction (UI)* REQUIRED
    Scope (S)* CHANGED

l➤ Impact Metrics:
    Confidentiality Impact (C)* NONE
    Integrity Impact (I)* HIGH
    Availability Impact (A)* NONE

Weakness Enumeration (CWE)

CWE-ID: CWE-670
CWE Name: CWE-670 Always-Incorrect Control Flow Implementation
Source: Trellix

Common Attack Pattern Enumeration and Classification (CAPEC)

CAPEC-ID: CAPEC-126
CAPEC Description: CAPEC-126 Path Traversal


Source: NVD (National Vulnerability Database).