8.2

CVE-2020-7250

Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
McafeeEndpoint Security Version10.5.0 SwPlatformwindows
McafeeEndpoint Security Version10.5.1 SwPlatformwindows
McafeeEndpoint Security Version10.5.2 SwPlatformwindows
McafeeEndpoint Security Version10.5.3 SwPlatformwindows
McafeeEndpoint Security Version10.5.4 SwPlatformwindows
McafeeEndpoint Security Version10.5.5 SwPlatformwindows
McafeeEndpoint Security Version10.6.0 SwPlatformwindows
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.09% 0.267
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.8 1.8 5.9
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
nvd@nist.gov 4.6 3.9 6.4
AV:L/AC:L/Au:N/C:P/I:P/A:P
trellixpsirt@trellix.com 8.2 1.5 6
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
CWE-59 Improper Link Resolution Before File Access ('Link Following')

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.