![]() Issue: The HdlpDiag tool reports Trellix Agent status as disconnected, when the policy size is beyond 20 MB. msg files doesn't execute for Web Protection Rules. Issue: The Exceptions defined for manually classified. Issue: Delays are observed when accessing data from network shares. Issue: A performance is observed in an endpoint system related to the algorithms used in Trellix DLP Endpoint. Issue: Trellix DLP automatically installs Microsoft Visual C++ 2010 as a prerequisite. Issue: The Microsoft Windows server 2012 R2 crashes and fails to restart after updating to Trellix DLP Endpoint. ![]() Workaround: Make sure to upgrade to DLP Endpoint 11.10.100 instead of DLP Endpoint 11.10.01 Hotfix. Issue: The fcags.exe crashes and respawns even after a successful upgrade from 11.6.702 Hotfix to 11.10.01 Hotfix. Issue: Trellix DLP Endpoint fails to prevent file uploads from Microsoft Edge and Google Chrome browsers using Distributed File System (DFS) paths. Issue: The Microsoft Edge and Google Chrome browsers doesn't load websites when Trellix DLP Endpoint is being installed. Issue: DLP Endpoint for Mac can't detect the Internet Calendar Scheduling files. Issue: macOS is observed to consume CPU and memory while executing or completing the discovery scans. Issue: Incidents were generated for folder paths containing spaces in the folder name, even when the folders were listed under Ignored Processes. Issue: The Cross-Site Scripting (XSS) vulnerability CVE-2021-31848 occurs in DLP Case Management. Issue: The SQL Injection vulnerability CVE-2021-31849 gets triggered when deleting user information in DLP Endpoint for Windows. Issue: The SQL Injection vulnerability CVE-2021-4088 allows a remote-authenticated attacker to inject unfiltered SQL into the DLP part of the ePO database. Issue: The vulnerability CVE-2022-2330 occurs for improper restriction of the XML External Entity Reference in DLP. Issue: The protection bypass vulnerability CVE-2023-0400 occurs in DLP Endpoint for Windows 11.9.x. Issue: A vulnerability CVE-2022-4450 is observed with the public-facing API function BIO_new_NDEF. Issue: A vulnerability CVE-2023-0215 issue with the PEM_read_bio_ex() function, reads a Privacy Enhanced Mail (PEM) file and returns a failure code, but still populates the name, header, and payload information. Issue: A vulnerability CVE-2022-4304 in Open SSL RSA decryption is caused by an improper timing-based side channel. Issue: A type confusion vulnerability CVE-2023-0286 is observed in the public structure definition for GENERAL_NAME that incorrectly specifies the type x400 address field as ASN1_TYPE. The critical resolved issues are listed below. Use of KardiaMobile and KardiaBand requires the Kardia App, available in the App Store and Google Play.Endpoint 11.6.401.1 Hotfix (GA) Extension ***Not compatible with the original Apple Watch (Series 0) Requires a paired iPhone and Apple Watch®, each of which must be in the list below: Apple Watch **Only compatible with KardiaMobile 6L & KardiaMobile Card Samsung Galaxy Tab A8 Lite** ( Android 11.0) **.Samsung Galaxy Tab A8 - (Android 12.0.0).Samsung Galaxy Tab A7 non-LTE (Android 11.0).Samsung Galaxy Tab A7 LTE (Android 11.0).Samsung Galaxy Tab A7 Lite (Android 11.0). ![]() Samsung Galaxy Tab A 8.0 2017 (Android 8.1.0).Samsung Galaxy Tab ActivePro 10.1 ( Android 11).Samsung Galaxy Tab Active4 Pro 5G ( Android 12).Samsung Galaxy S21 Ultra (Android 12.0.0).Samsung Galaxy S21+ 5G (Android 12.0.0).Samsung Galaxy S20 Ultra 5G (Android 12.0.0).Samsung Galaxy S20 Ultra (Android 12.0.0).Samsung Galaxy S20+ 5G (Android 12.0.0).Samsung Galaxy S20 FE 5G (Android 12.0.0). ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |