Risk | Low |
Patch available | YES |
Number of vulnerabilities | 4 |
CVE-ID | CVE-2020-7319 CVE-2020-7323 CVE-2020-7322 CVE-2020-7320 |
CWE-ID | CWE-284 CWE-287 CWE-200 CWE-693 |
Exploitation vector | Local |
Public exploit | N/A |
Vulnerable software Subscribe |
McAfee Endpoint Security (ENS) Client/Desktop applications / Antivirus software/Personal firewalls |
Vendor | McAfee |
Security Bulletin
This security bulletin contains information about 4 vulnerabilities.
EUVDB-ID: #VU46687
Risk: Low
CVSSv3.1: 7.7 [CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-7319
CWE-ID:
CWE-284 - Improper Access Control
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain unauthorized access to otherwise restricted functionality.
The vulnerability exists due to improper access restrictions. A local user can access files which the user otherwise would not have access to via manipulating symbolic links to redirect McAfee file operations to an unintended file.
Note: This vulnerability affects the following versions:
Mitigation
Install updates from vendor's website.
Vulnerable software versionsMcAfee Endpoint Security (ENS): before 10.7.0 September 2020 Update
External linkshttp://kc.mcafee.com/corporate/index?page=content&id=SB10327
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU46690
Risk: Low
CVSSv3.1: 6 [CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-7323
CWE-ID:
CWE-287 - Improper Authentication
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to bypass authentication process.
The vulnerability exists due to an error in when processing authentication requests. An attacker with physical access can bypass the Windows lock screen via triggering certain detection events while the computer screen is locked and the McTray.exe is running with elevated privileges.
Note: This vulnerability affects the following versions:
Install updates from vendor's website.
Vulnerable software versionsMcAfee Endpoint Security (ENS): before 10.7.0 September 2020 Update
External linkshttp://kc.mcafee.com/corporate/index?page=content&id=SB10327
Q & A
Can this vulnerability be exploited remotely?
No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU46689
Risk: Low
CVSSv3.1: 1.7 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-7322
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local user to gain access to potentially sensitive information.
The vulnerability exists due to excessive data output by the application. A local administrator can gain unauthorized access to sensitive information on the system via incorrectly logging of sensitive information in debug logs.
Note: This vulnerability affects the following versions:
Install updates from vendor's website.
Vulnerable software versionsMcAfee Endpoint Security (ENS): before 10.7.0 September 2020 Update
External linkshttp://kc.mcafee.com/corporate/index?page=content&id=SB10327
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU46688
Risk: Low
CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:L/I:H/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2020-7320
CWE-ID:
CWE-693 - Protection Mechanism Failure
Exploit availability: No
DescriptionThe vulnerability allows a local user to bypass implemented security restrictions.
The vulnerability exists due to insufficient implementation of security measures. A local administrator can temporarily reduce the detection capability allowing otherwise detected malware to run via stopping certain Microsoft services.
Note: This vulnerability affects the following versions:
Install updates from vendor's website.
Vulnerable software versionsMcAfee Endpoint Security (ENS): before 10.7.0 September 2020 Update
External linkshttp://kc.mcafee.com/corporate/index?page=content&id=SB10327
Q & A
Can this vulnerability be exploited remotely?
No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.