{"api_version":"1","generated_at":"2026-04-22T22:31:24+00:00","cve":"CVE-2023-3438","urls":{"html":"https://cve.report/CVE-2023-3438","api":"https://cve.report/api/cve/CVE-2023-3438.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2023-3438","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2023-3438"},"summary":{"title":"CVE-2023-3438","description":"An unquoted Windows search path vulnerability existed in the install the MOVE 4.10.x and earlier Windows install service (mvagtsce.exe). \nThe misconfiguration allowed an unauthorized local user to insert arbitrary code into the unquoted service path to obtain privilege escalation and stop antimalware services.","state":"PUBLIC","assigner":"trellixpsirt@trellix.com","published_at":"2023-07-03 08:15:00","updated_at":"2023-07-14 14:43:00"},"problem_types":["CWE-428"],"metrics":[],"references":[{"url":"https://kcm.trellix.com/corporate/index?page=content&id=SB10404","name":"https://kcm.trellix.com/corporate/index?page=content&id=SB10404","refsource":"MISC","tags":[],"title":"Security Bulletin - Trellix Move 4.10.1 fixes vulnerability CVE-2023-3438","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://www.cve.org/CVERecord?id=CVE-2023-3438","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2023-3438","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2023","cve_id":"3438","vulnerable":"1","versionEndIncluding":"4.10.0","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"trellix","cpe5":"move","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_version":"4.0","data_type":"CVE","data_format":"MITRE","CVE_data_meta":{"ID":"CVE-2023-3438","ASSIGNER":"trellixpsirt@trellix.com","STATE":"PUBLIC"},"description":{"description_data":[{"lang":"eng","value":"\nAn unquoted Windows search path vulnerability existed in the install the MOVE 4.10.x and earlier Windows install service (mvagtsce.exe). \nThe misconfiguration allowed an unauthorized local user to insert arbitrary code into the unquoted service path to obtain privilege escalation and stop antimalware services.\n\n"}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-428 Unquoted Search Path or Element","cweId":"CWE-428"}]}]},"affects":{"vendor":{"vendor_data":[{"vendor_name":"Trellix","product":{"product_data":[{"product_name":"Trellix Move","version":{"version_data":[{"version_affected":"=","version_value":"4.10.0"}]}}]}}]}},"references":{"reference_data":[{"url":"https://kcm.trellix.com/corporate/index?page=content&id=SB10404","refsource":"MISC","name":"https://kcm.trellix.com/corporate/index?page=content&id=SB10404"}]},"generator":{"engine":"Vulnogram 0.1.0-dev"},"source":{"discovery":"UNKNOWN"},"impact":{"cvss":[{"attackComplexity":"LOW","attackVector":"LOCAL","availabilityImpact":"HIGH","baseScore":4.4,"baseSeverity":"MEDIUM","confidentialityImpact":"NONE","integrityImpact":"NONE","privilegesRequired":"HIGH","scope":"UNCHANGED","userInteraction":"NONE","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H","version":"3.1"}]}},"nvd":{"publishedDate":"2023-07-03 08:15:00","lastModifiedDate":"2023-07-14 14:43:00","problem_types":["CWE-428"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:trellix:move:*:*:*:*:*:windows:*:*","versionEndIncluding":"4.10.0","cpe_name":[]}]}]}},"legacy_mitre":{"record":null,"notes":[]}}}