6.7
CVE-2020-7337
- EPSS 0.03%
- Published 09.12.2020 09:15:13
- Last modified 21.11.2024 05:37:05
- Source trellixpsirt@trellix.com
- Teams watchlist Login
- Open Login
Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.
Data is provided by the National Vulnerability Database (NVD)
Mcafee ≫ Virusscan Enterprise Version < 8.8
Mcafee ≫ Virusscan Enterprise Version8.8 Update-
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch1
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch10
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch11
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch12
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch13
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch14
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch15
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch2
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch3
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch4
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch5
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch6
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch7
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch8
Mcafee ≫ Virusscan Enterprise Version8.8 Updatepatch9
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.03% | 0.071 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.7 | 0.8 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
|
nvd@nist.gov | 4.6 | 3.9 | 6.4 |
AV:L/AC:L/Au:N/C:P/I:P/A:P
|
trellixpsirt@trellix.com | 6.5 | 0.6 | 5.9 |
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
|
CWE-732 Incorrect Permission Assignment for Critical Resource
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.