#VU46690 Improper Authentication in McAfee Endpoint Security (ENS)


Published: 2020-09-14

Vulnerability identifier: #VU46690

Vulnerability risk: Low

CVSSv3.1: 6 [CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2020-7323

CWE-ID: CWE-287

Exploitation vector: Local

Exploit availability: No

Vulnerable software:
McAfee Endpoint Security (ENS)
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor: McAfee

Description

The vulnerability allows a local attacker to bypass authentication process.

The vulnerability exists due to an error in when processing authentication requests. An attacker with physical access can bypass the Windows lock screen via triggering certain detection events while the computer screen is locked and the McTray.exe is running with elevated privileges.

Note: This vulnerability affects the following versions:

  • 10.7.0.x
  • 10.6.x
  • 10.5.x

Mitigation
Install updates from vendor's website.

Vulnerable software versions

McAfee Endpoint Security (ENS): All versions


External links
http://kc.mcafee.com/corporate/index?page=content&id=SB10327


Q & A

Can this vulnerability be exploited remotely?

No. The attacker should have physical access to the system in order to successfully exploit this vulnerability.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability