{"api_version":"1","generated_at":"2026-04-22T22:32:35+00:00","cve":"CVE-2023-3313","urls":{"html":"https://cve.report/CVE-2023-3313","api":"https://cve.report/api/cve/CVE-2023-3313.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-3313","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-3313"},"summary":{"title":"CVE-2023-3313","description":"An OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.","state":"PUBLIC","assigner":"trellixpsirt@trellix.com","published_at":"2023-07-03 08:15:00","updated_at":"2023-07-11 16:09:00"},"problem_types":["CWE-78"],"metrics":[],"references":[{"url":"https://kcm.trellix.com/corporate/index?page=content&id=SB10403","name":"https://kcm.trellix.com/corporate/index?page=content&id=SB10403","refsource":"MISC","tags":[],"title":"Security Bulletin - Enterprise Security Manager fixes two vulnerabilities (CVE-2023-3313 and CVE-2023-3314)","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-3313","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3313","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"3313","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trellix","cpe5":"enterprise_security_manager","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-3313","ASSIGNER":"trellixpsirt@trellix.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"\nAn OS common injection vulnerability exists in the ESM certificate API, whereby incorrectly neutralized special elements may have allowed an unauthorized user to execute system command injection for the purpose of privilege escalation or to execute arbitrary commands.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')","cweId":"CWE-78"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Trellix","product":{"product_data":[{"product_name":"Enterprise Security Manager","version":{"version_data":[{"version_affected":"=","version_value":"11.6.3"}]}}]}}]}},"references":{"reference_data":[{"url":"https://kcm.trellix.com/corporate/index?page=content&id=SB10403","refsource":"MISC","name":"https://kcm.trellix.com/corporate/index?page=content&id=SB10403"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"credits":[{"lang":"en","value":"Andre Waldhoff (condignum GmbH)"},{"lang":"en","value":"Johannes Bär (condignum GmbH)"}],"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH","confidentialityImpact":"HIGH","integrityImpact":"HIGH","privilegesRequired":"LOW","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-03 08:15:00","lastModifiedDate":"2023-07-11 16:09:00","problem_types":["CWE-78"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trellix:enterprise_security_manager:*:*:*:*:*:*:*:*","versionEndExcluding":"11.6.7","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}