CVE-2020-8097 – Improper authentication vulnerability in Bitdefender Endpoint Security Tools and Endpoint Security SDK (VA-8646)
https://notcve.org/view.php?id=CVE-2020-8097
An improper authentication vulnerability in Bitdefender Endpoint Security Tools for Windows and Bitdefender Endpoint Security SDK allows an unprivileged local attacker to escalate privileges or tamper with the product's security settings. This issue affects: Bitdefender Endpoint Security Tools for Windows versions prior to 6.6.18.261. This issue affects: Bitdefender Endpoint Security Tools for Windows versions prior to 6.6.18.261. Bitdefender Endpoint Security SDK versions prior to 6.6.18.261. Una vulnerabilidad de autenticación inapropiada en Bitdefender Endpoint Security Tools para Windows y Bitdefender Endpoint Security SDK, permite a un atacante local no privilegiado escalar privilegios o alterar la configuración de seguridad del producto. • https://www.bitdefender.com/support/security-advisories/improper-authentication-vulnerability-bitdefender-endpoint-security-tools-endpoint-security-sdk-va-8646 • CWE-287: Improper Authentication •
CVE-2020-8108 – Insufficient client validation in Bitdefender Endpoint Security for Mac (VA-8759)
https://notcve.org/view.php?id=CVE-2020-8108
Improper Authentication vulnerability in Bitdefender Endpoint Security for Mac allows an unprivileged process to restart the main service and potentially inject third-party code into a trusted process. This issue affects: Bitdefender Endpoint Security for Mac versions prior to 4.12.80. Una vulnerabilidad de Autenticación Inapropiada en Bitdefender Endpoint Security para Mac, permite a un proceso no privilegiado reiniciar el servicio principal y potencialmente inyectar código de terceros a un proceso confiable. Este problema afecta a: Bitdefender Endpoint Security para Mac versiones anteriores a 4.12.80 • https://www.bitdefender.com/support/security-advisories/insufficient-client-validation-bitdefender-endpoint-security-mac-va-8759 • CWE-287: Improper Authentication •
CVE-2020-7251 – ESConfig Tool able to edit configuration for newer version
https://notcve.org/view.php?id=CVE-2020-7251
Improper access control vulnerability in Configuration Tool in McAfee Mcafee Endpoint Security (ENS) Prior to 10.6.1 February 2020 Update allows local users to disable security features via unauthorised use of the configuration tool from older versions of ENS. Una vulnerabilidad de control de acceso inapropiada en Configuration Tool en Mcafee Endpoint Security (ENS) versiones anteriores a 10.6.1. La Actualización de febrero de 2020, permite a usuarios locales deshabilitar las características de seguridad, por medio del uso no autorizado de configuration tool desde las versiones anteriores de ENS. • https://kc.mcafee.com/corporate/index?page=content&id=SB10299 • CWE-358: Improperly Implemented Security Check for Standard CWE-863: Incorrect Authorization •
CVE-2019-16519
https://notcve.org/view.php?id=CVE-2019-16519
ESET Cyber Security 6.7.900.0 for macOS allows a local attacker to execute unauthorized commands as root by abusing an undocumented feature in scheduled tasks. ESET Cyber ??Security 6.7.900.0 para macOS permite a un atacante local ejecutar comandos no autorizados como root al abusar de una función no documentada en las tareas programadas. • http://support.eset.com/ca7317 https://danishcyberdefence.dk/blog/esets-cyber-security • CWE-269: Improper Privilege Management •
CVE-2019-8461
https://notcve.org/view.php?id=CVE-2019-8461
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user. Check Point Endpoint Security Initial Client para Windows versión anterior a E81.30, intenta cargar una biblioteca DLL localizada en cualquier ubicación de RUTA (PATH) en una imagen limpia sin el Endpoint Client instalado. Un atacante puede aprovechar esto para conseguir LPE usando una DLL especialmente diseñada localizada en cualquier ubicación de RUTA (PATH) accesible con permisos de escritura para el usuario. • https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk160812 • CWE-114: Process Control CWE-426: Untrusted Search Path •