CVE-2020-7337 (GCVE-0-2020-7337)
Vulnerability from cvelistv5 – Published: 2020-12-09 08:40 – Updated: 2024-09-16 18:18
VLAI?
Title
Incorrect Permission Assignment for Critical Resource
Summary
Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.
Severity ?
6.5 (Medium)
CWE
- CWE-732 - Incorrect Permission Assignment for Critical Resource
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| McAfee, LLC | VirusScan Enterprise (VSE) |
Affected:
8.8.x , ≤ patch 15
(custom)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T09:25:49.074Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "VirusScan Enterprise (VSE)",
"vendor": "McAfee, LLC",
"versions": [
{
"lessThanOrEqual": "patch 15",
"status": "affected",
"version": "8.8.x",
"versionType": "custom"
}
]
}
],
"datePublic": "2020-12-08T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-732",
"description": "CWE-732 Incorrect Permission Assignment for Critical Resource",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-12-09T08:40:14",
"orgId": "01626437-bf8f-4d1c-912a-893b5eb04808",
"shortName": "trellix"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338"
}
],
"source": {
"discovery": "INTERNAL"
},
"title": "Incorrect Permission Assignment for Critical Resource",
"x_generator": {
"engine": "Vulnogram 0.0.9"
},
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@mcafee.com",
"DATE_PUBLIC": "2020-12-08T00:00:00.000Z",
"ID": "CVE-2020-7337",
"STATE": "PUBLIC",
"TITLE": "Incorrect Permission Assignment for Critical Resource"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "VirusScan Enterprise (VSE)",
"version": {
"version_data": [
{
"version_affected": "\u003c=",
"version_name": "8.8.x",
"version_value": "patch 15"
}
]
}
}
]
},
"vendor_name": "McAfee, LLC"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks."
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
"impact": {
"cvss": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-732 Incorrect Permission Assignment for Critical Resource"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338",
"refsource": "CONFIRM",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338"
}
]
},
"source": {
"discovery": "INTERNAL"
}
}
}
},
"cveMetadata": {
"assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808",
"assignerShortName": "trellix",
"cveId": "CVE-2020-7337",
"datePublished": "2020-12-09T08:40:14.736661Z",
"dateReserved": "2020-01-21T00:00:00",
"dateUpdated": "2024-09-16T18:18:07.120Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.8\", \"matchCriteriaId\": \"324B63C7-6AA0-4943-935E-85A1F949C509\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"739CE02A-E38F-4B8E-8902-FB6C6DF0C2D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D14CEFB-F8A2-4E07-8248-C8DDE8665EB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch10:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA1D6C3D-0496-43DB-85EF-0F9801F8DD54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch11:*:*:*:*:*:*\", \"matchCriteriaId\": \"586B2C78-640C-475F-9ED3-ECDA83F8B26A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch12:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE55ECB6-2B28-4A1A-A8BA-17ADFB97D61A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch13:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C79BC0A-E955-4170-AE0C-E6868FF38E92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch14:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E87B844-7FE9-4AB6-8E09-B22A9419079A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch15:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F27699-3594-4B59-891E-0241AE13D7E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5550350-5035-41AB-BCD0-D24E669839C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DF43DB-F296-4D0E-89F0-B807DBC750C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch4:*:*:*:*:*:*\", \"matchCriteriaId\": \"4095418F-39EF-4A47-BCBA-BEE0B81B4E51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch5:*:*:*:*:*:*\", \"matchCriteriaId\": \"441512BE-F8A5-4690-9005-DCAB0EE86CC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch6:*:*:*:*:*:*\", \"matchCriteriaId\": \"04273536-A593-4439-9325-1C57BAAB60D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch7:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9F3CB2-5A92-4EBB-B109-44690EE096FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch8:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AE7C3D5-9771-40A9-B7A3-37EFEFC9FD9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch9:*:*:*:*:*:*\", \"matchCriteriaId\": \"61ADDBB0-F71D-46D1-9DB5-38905954C33A\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de Asignaci\\u00f3n de Permisos Incorrecta de Recursos Cr\\u00edticos en McAfee VirusScan Enterprise (VSE) versiones anteriores a 8.8 Parche 16 permite a administradores locales omitir la protecci\\u00f3n de seguridad local por medio de VSE que no se integra correctamente con Windows Defender Application Control mediante la manipulaci\\u00f3n cuidadosa de las comprobaciones de Integridad del C\\u00f3digo\"}]",
"id": "CVE-2020-7337",
"lastModified": "2024-11-21T05:37:05.333",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"trellixpsirt@trellix.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.6, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2020-12-09T09:15:13.200",
"references": "[{\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338\", \"source\": \"trellixpsirt@trellix.com\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "trellixpsirt@trellix.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"trellixpsirt@trellix.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-732\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2020-7337\",\"sourceIdentifier\":\"trellixpsirt@trellix.com\",\"published\":\"2020-12-09T09:15:13.200\",\"lastModified\":\"2024-11-21T05:37:05.333\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de Asignaci\u00f3n de Permisos Incorrecta de Recursos Cr\u00edticos en McAfee VirusScan Enterprise (VSE) versiones anteriores a 8.8 Parche 16 permite a administradores locales omitir la protecci\u00f3n de seguridad local por medio de VSE que no se integra correctamente con Windows Defender Application Control mediante la manipulaci\u00f3n cuidadosa de las comprobaciones de Integridad del C\u00f3digo\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"trellixpsirt@trellix.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"trellixpsirt@trellix.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8\",\"matchCriteriaId\":\"324B63C7-6AA0-4943-935E-85A1F949C509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"739CE02A-E38F-4B8E-8902-FB6C6DF0C2D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D14CEFB-F8A2-4E07-8248-C8DDE8665EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch10:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA1D6C3D-0496-43DB-85EF-0F9801F8DD54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch11:*:*:*:*:*:*\",\"matchCriteriaId\":\"586B2C78-640C-475F-9ED3-ECDA83F8B26A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch12:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE55ECB6-2B28-4A1A-A8BA-17ADFB97D61A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch13:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C79BC0A-E955-4170-AE0C-E6868FF38E92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch14:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E87B844-7FE9-4AB6-8E09-B22A9419079A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch15:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F27699-3594-4B59-891E-0241AE13D7E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5550350-5035-41AB-BCD0-D24E669839C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DF43DB-F296-4D0E-89F0-B807DBC750C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4095418F-39EF-4A47-BCBA-BEE0B81B4E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch5:*:*:*:*:*:*\",\"matchCriteriaId\":\"441512BE-F8A5-4690-9005-DCAB0EE86CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch6:*:*:*:*:*:*\",\"matchCriteriaId\":\"04273536-A593-4439-9325-1C57BAAB60D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch7:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F3CB2-5A92-4EBB-B109-44690EE096FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch8:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE7C3D5-9771-40A9-B7A3-37EFEFC9FD9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch9:*:*:*:*:*:*\",\"matchCriteriaId\":\"61ADDBB0-F71D-46D1-9DB5-38905954C33A\"}]}]}],\"references\":[{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338\",\"source\":\"trellixpsirt@trellix.com\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…