7.2
CVE-2019-3648
- EPSS 0.17%
- Published 13.11.2019 09:15:10
- Last modified 21.11.2024 04:42:17
- Source trellixpsirt@trellix.com
- Teams watchlist Login
- Open Login
A Privilege Escalation vulnerability in the Microsoft Windows client in McAfee Total Protection 16.0.R22 and earlier allows administrators to execute arbitrary code via carefully placing malicious files in specific locations protected by administrator permission.
Data is provided by the National Vulnerability Database (NVD)
Mcafee ≫ Anti-virus Plus Version <= 16.0.r22
Mcafee ≫ Internet Security Version <= 16.0.r22
Mcafee ≫ Total Protection Version <= 16.0r22
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.17% | 0.346 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 7.2 | 3.9 | 10 |
AV:L/AC:L/Au:N/C:C/I:C/A:C
|
trellixpsirt@trellix.com | 6.1 | 0.8 | 4.7 |
CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L
|
CWE-426 Untrusted Search Path
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.