FKIE_CVE-2020-7337
Vulnerability from fkie_nvd - Published: 2020-12-09 09:15 - Updated: 2024-11-21 05:37
Severity ?
6.5 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
6.7 (Medium) - CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
Summary
Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| mcafee | virusscan_enterprise | * | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 | |
| mcafee | virusscan_enterprise | 8.8 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:*:*:*:*:*:*:*:*",
"matchCriteriaId": "324B63C7-6AA0-4943-935E-85A1F949C509",
"versionEndExcluding": "8.8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:-:*:*:*:*:*:*",
"matchCriteriaId": "739CE02A-E38F-4B8E-8902-FB6C6DF0C2D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch1:*:*:*:*:*:*",
"matchCriteriaId": "1D14CEFB-F8A2-4E07-8248-C8DDE8665EB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch10:*:*:*:*:*:*",
"matchCriteriaId": "CA1D6C3D-0496-43DB-85EF-0F9801F8DD54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch11:*:*:*:*:*:*",
"matchCriteriaId": "586B2C78-640C-475F-9ED3-ECDA83F8B26A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch12:*:*:*:*:*:*",
"matchCriteriaId": "BE55ECB6-2B28-4A1A-A8BA-17ADFB97D61A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch13:*:*:*:*:*:*",
"matchCriteriaId": "9C79BC0A-E955-4170-AE0C-E6868FF38E92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch14:*:*:*:*:*:*",
"matchCriteriaId": "6E87B844-7FE9-4AB6-8E09-B22A9419079A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch15:*:*:*:*:*:*",
"matchCriteriaId": "C2F27699-3594-4B59-891E-0241AE13D7E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch2:*:*:*:*:*:*",
"matchCriteriaId": "D5550350-5035-41AB-BCD0-D24E669839C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch3:*:*:*:*:*:*",
"matchCriteriaId": "E7DF43DB-F296-4D0E-89F0-B807DBC750C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch4:*:*:*:*:*:*",
"matchCriteriaId": "4095418F-39EF-4A47-BCBA-BEE0B81B4E51",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch5:*:*:*:*:*:*",
"matchCriteriaId": "441512BE-F8A5-4690-9005-DCAB0EE86CC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch6:*:*:*:*:*:*",
"matchCriteriaId": "04273536-A593-4439-9325-1C57BAAB60D8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch7:*:*:*:*:*:*",
"matchCriteriaId": "CC9F3CB2-5A92-4EBB-B109-44690EE096FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch8:*:*:*:*:*:*",
"matchCriteriaId": "5AE7C3D5-9771-40A9-B7A3-37EFEFC9FD9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch9:*:*:*:*:*:*",
"matchCriteriaId": "61ADDBB0-F71D-46D1-9DB5-38905954C33A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Incorrect Permission Assignment for Critical Resource vulnerability in McAfee VirusScan Enterprise (VSE) prior to 8.8 Patch 16 allows local administrators to bypass local security protection through VSE not correctly integrating with Windows Defender Application Control via careful manipulation of the Code Integrity checks."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Asignaci\u00f3n de Permisos Incorrecta de Recursos Cr\u00edticos en McAfee VirusScan Enterprise (VSE) versiones anteriores a 8.8 Parche 16 permite a administradores locales omitir la protecci\u00f3n de seguridad local por medio de VSE que no se integra correctamente con Windows Defender Application Control mediante la manipulaci\u00f3n cuidadosa de las comprobaciones de Integridad del C\u00f3digo"
}
],
"id": "CVE-2020-7337",
"lastModified": "2024-11-21T05:37:05.333",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.6,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.5,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.6,
"impactScore": 5.9,
"source": "trellixpsirt@trellix.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2020-12-09T09:15:13.200",
"references": [
{
"source": "trellixpsirt@trellix.com",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=SB10338"
}
],
"sourceIdentifier": "trellixpsirt@trellix.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-732"
}
],
"source": "trellixpsirt@trellix.com",
"type": "Secondary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…