Multiple vulnerabilities in McAfee Endpoint Security (ENS)



Published: 2020-09-14
Risk Low
Patch available YES
Number of vulnerabilities 4
CVE-ID CVE-2020-7319
CVE-2020-7323
CVE-2020-7322
CVE-2020-7320
CWE-ID CWE-284
CWE-287
CWE-200
CWE-693
Exploitation vector Local
Public exploit N/A
Vulnerable software
Subscribe
McAfee Endpoint Security (ENS)
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor McAfee

Security Bulletin

This security bulletin contains information about 4 vulnerabilities.

1) Improper access control

EUVDB-ID: #VU46687

Risk: Low

CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-7319

CWE-ID: CWE-284 - Improper Access Control

Exploit availability: No

Description

The vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.

The vulnerability exists due to improper access restrictions. A local user can access files which the user otherwise would not have access to via manipulating symbolic links to redirect McAfee file operations to an unintended file.

Note: This vulnerability affects the following versions:

  • 10.7.0.x
  • 10.6.x
  • 10.5.x

Mitigation

Install updates from vendor's website.

Vulnerable software versions

McAfee Endpoint Security (ENS): before 10.7.0 September 2020 Update

External links

http://kc.mcafee.com/corporate/index?page=content&id=SB10327


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper Authentication

EUVDB-ID: #VU46690

Risk: Low

CVSSv3.1: 6 [CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-7323

CWE-ID: CWE-287 - Improper Authentication

Exploit availability: No

Description

The vulnerability allows a local attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. An attacker with physical access can bypass the Windows lock screen via triggering certain detection events while the computer screen is locked and the McTray.exe is running with elevated privileges.

Note: This vulnerability affects the following versions:

  • 10.7.0.x
  • 10.6.x
  • 10.5.x

Mitigation

Install updates from vendor's website.

Vulnerable software versions

McAfee Endpoint Security (ENS): before 10.7.0 September 2020 Update

External links

http://kc.mcafee.com/corporate/index?page=content&id=SB10327


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Information disclosure

EUVDB-ID: #VU46689

Risk: Low

CVSSv3.1: 1.7 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-7322

CWE-ID: CWE-200 - Information exposure

Exploit availability: No

Description

The vulnerability allows a local user to gain access to potentially sensitive information.

The vulnerability exists due to excessive data output by the application. A local administrator can gain unauthorized access to sensitive information on the system via incorrectly logging of sensitive information in debug logs.

Note: This vulnerability affects the following versions:

  • 10.7.0.x
  • 10.6.x
  • 10.5.x

Mitigation

Install updates from vendor's website.

Vulnerable software versions

McAfee Endpoint Security (ENS): before 10.7.0 September 2020 Update

External links

http://kc.mcafee.com/corporate/index?page=content&id=SB10327


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

4) Protection Mechanism Failure

EUVDB-ID: #VU46688

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-7320

CWE-ID: CWE-693 - Protection Mechanism Failure

Exploit availability: No

Description

The vulnerability allows a local user to bypass implemented security restrictions.

The vulnerability exists due to insufficient implementation of security measures. A local administrator can temporarily reduce the detection capability allowing otherwise detected malware to run via stopping certain Microsoft services.

Note: This vulnerability affects the following versions:

  • 10.7.0.x
  • 10.6.x
  • 10.5.x

Mitigation

Install updates from vendor's website.

Vulnerable software versions

McAfee Endpoint Security (ENS): before 10.7.0 September 2020 Update

External links

http://kc.mcafee.com/corporate/index?page=content&id=SB10327


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###