### [CVE-2023-0976](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-0976) ![](https://img.shields.io/static/v1?label=Product&message=Trellix%20Agent&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%205.7.8%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-427%20Uncontrolled%20Search%20Path%20Element&color=brighgreen) ### Description A command Injection Vulnerability in TA for mac-OS prior to version 5.7.9 allows local users to place an arbitrary file into the /Library/Trellix/Agent/bin/ folder. The malicious file is executed by running the TA deployment feature located in the System Tree. ### POC #### Reference - https://kcm.trellix.com/corporate/index?page=content&id=SB10398 #### Github No PoCs found on GitHub currently.