cve-2020-7337
Vulnerability from cvelistv5
Published
2020-12-09 08:40
Modified
2024-09-16 18:18
Severity ?
EPSS score ?
Summary
Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | McAfee, LLC | VirusScan Enterprise (VSE) |
Version: 8.8.x < |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T09:25:49.074Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VirusScan Enterprise (VSE)", "vendor": "McAfee, LLC", "versions": [ { "lessThanOrEqual": "patch 15", "status": "affected", "version": "8.8.x", "versionType": "custom" } ] } ], "datePublic": "2020-12-08T00:00:00", "descriptions": [ { "lang": "en", "value": "Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732 Incorrect Permission Assignment for Critical Resource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-12-09T08:40:14", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338" } ], "source": { "discovery": "INTERNAL" }, "title": "Incorrect Permission Assignment for Critical Resource", "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@mcafee.com", "DATE_PUBLIC": "2020-12-08T00:00:00.000Z", "ID": "CVE-2020-7337", "STATE": "PUBLIC", "TITLE": "Incorrect Permission Assignment for Critical Resource" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VirusScan Enterprise (VSE)", "version": { "version_data": [ { "version_affected": "\u003c=", "version_name": "8.8.x", "version_value": "patch 15" } ] } } ] }, "vendor_name": "McAfee, LLC" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.5, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-732 Incorrect Permission Assignment for Critical Resource" } ] } ] }, "references": { "reference_data": [ { "name": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338" } ] }, "source": { "discovery": "INTERNAL" } } } }, "cveMetadata": { "assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2020-7337", "datePublished": "2020-12-09T08:40:14.736661Z", "dateReserved": "2020-01-21T00:00:00", "dateUpdated": "2024-09-16T18:18:07.120Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "fkie_nvd": { "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:*:*:*\", \"versionEndExcluding\": \"8.8\", \"matchCriteriaId\": \"324B63C7-6AA0-4943-935E-85A1F949C509\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"739CE02A-E38F-4B8E-8902-FB6C6DF0C2D6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch1:*:*:*:*:*:*\", \"matchCriteriaId\": \"1D14CEFB-F8A2-4E07-8248-C8DDE8665EB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch10:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA1D6C3D-0496-43DB-85EF-0F9801F8DD54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch11:*:*:*:*:*:*\", \"matchCriteriaId\": \"586B2C78-640C-475F-9ED3-ECDA83F8B26A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch12:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE55ECB6-2B28-4A1A-A8BA-17ADFB97D61A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch13:*:*:*:*:*:*\", \"matchCriteriaId\": \"9C79BC0A-E955-4170-AE0C-E6868FF38E92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch14:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E87B844-7FE9-4AB6-8E09-B22A9419079A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch15:*:*:*:*:*:*\", \"matchCriteriaId\": \"C2F27699-3594-4B59-891E-0241AE13D7E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch2:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5550350-5035-41AB-BCD0-D24E669839C1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch3:*:*:*:*:*:*\", \"matchCriteriaId\": \"E7DF43DB-F296-4D0E-89F0-B807DBC750C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch4:*:*:*:*:*:*\", \"matchCriteriaId\": \"4095418F-39EF-4A47-BCBA-BEE0B81B4E51\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch5:*:*:*:*:*:*\", \"matchCriteriaId\": \"441512BE-F8A5-4690-9005-DCAB0EE86CC3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch6:*:*:*:*:*:*\", \"matchCriteriaId\": \"04273536-A593-4439-9325-1C57BAAB60D8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch7:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC9F3CB2-5A92-4EBB-B109-44690EE096FF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch8:*:*:*:*:*:*\", \"matchCriteriaId\": \"5AE7C3D5-9771-40A9-B7A3-37EFEFC9FD9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch9:*:*:*:*:*:*\", \"matchCriteriaId\": \"61ADDBB0-F71D-46D1-9DB5-38905954C33A\"}]}]}]", "descriptions": "[{\"lang\": \"en\", \"value\": \"Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad de Asignaci\\u00f3n de Permisos Incorrecta de Recursos Cr\\u00edticos en McAfee VirusScan Enterprise (VSE) versiones anteriores a 8.8 Parche 16 permite a administradores locales omitir la protecci\\u00f3n de seguridad local por medio de VSE que no se integra correctamente con Windows Defender Application Control mediante la manipulaci\\u00f3n cuidadosa de las comprobaciones de Integridad del C\\u00f3digo\"}]", "id": "CVE-2020-7337", "lastModified": "2024-11-21T05:37:05.333", "metrics": "{\"cvssMetricV31\": [{\"source\": \"trellixpsirt@trellix.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\", \"baseScore\": 6.5, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.6, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 6.7, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"LOCAL\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"HIGH\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 0.8, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:L/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 4.6, \"accessVector\": \"LOCAL\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 3.9, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}", "published": "2020-12-09T09:15:13.200", "references": "[{\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338\", \"source\": \"trellixpsirt@trellix.com\"}, {\"url\": \"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]", "sourceIdentifier": "trellixpsirt@trellix.com", "vulnStatus": "Modified", "weaknesses": "[{\"source\": \"trellixpsirt@trellix.com\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-732\"}]}]" }, "nvd": "{\"cve\":{\"id\":\"CVE-2020-7337\",\"sourceIdentifier\":\"trellixpsirt@trellix.com\",\"published\":\"2020-12-09T09:15:13.200\",\"lastModified\":\"2024-11-21T05:37:05.333\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad de Asignaci\u00f3n de Permisos Incorrecta de Recursos Cr\u00edticos en McAfee VirusScan Enterprise (VSE) versiones anteriores a 8.8 Parche 16 permite a administradores locales omitir la protecci\u00f3n de seguridad local por medio de VSE que no se integra correctamente con Windows Defender Application Control mediante la manipulaci\u00f3n cuidadosa de las comprobaciones de Integridad del C\u00f3digo\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"trellixpsirt@trellix.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.5,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.6,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":6.7,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":4.6,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":3.9,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"trellixpsirt@trellix.com\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-732\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:*:*:*\",\"versionEndExcluding\":\"8.8\",\"matchCriteriaId\":\"324B63C7-6AA0-4943-935E-85A1F949C509\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"739CE02A-E38F-4B8E-8902-FB6C6DF0C2D6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch1:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D14CEFB-F8A2-4E07-8248-C8DDE8665EB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch10:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA1D6C3D-0496-43DB-85EF-0F9801F8DD54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch11:*:*:*:*:*:*\",\"matchCriteriaId\":\"586B2C78-640C-475F-9ED3-ECDA83F8B26A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch12:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE55ECB6-2B28-4A1A-A8BA-17ADFB97D61A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch13:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C79BC0A-E955-4170-AE0C-E6868FF38E92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch14:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E87B844-7FE9-4AB6-8E09-B22A9419079A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch15:*:*:*:*:*:*\",\"matchCriteriaId\":\"C2F27699-3594-4B59-891E-0241AE13D7E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch2:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5550350-5035-41AB-BCD0-D24E669839C1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch3:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7DF43DB-F296-4D0E-89F0-B807DBC750C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch4:*:*:*:*:*:*\",\"matchCriteriaId\":\"4095418F-39EF-4A47-BCBA-BEE0B81B4E51\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch5:*:*:*:*:*:*\",\"matchCriteriaId\":\"441512BE-F8A5-4690-9005-DCAB0EE86CC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch6:*:*:*:*:*:*\",\"matchCriteriaId\":\"04273536-A593-4439-9325-1C57BAAB60D8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch7:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC9F3CB2-5A92-4EBB-B109-44690EE096FF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch8:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AE7C3D5-9771-40A9-B7A3-37EFEFC9FD9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch9:*:*:*:*:*:*\",\"matchCriteriaId\":\"61ADDBB0-F71D-46D1-9DB5-38905954C33A\"}]}]}],\"references\":[{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338\",\"source\":\"trellixpsirt@trellix.com\"},{\"url\":\"https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.