Page 3 of 33 results (0.010 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Nov 2020 — Unquoted service executable path in McAfee Endpoint Security (ENS) prior to 10.7.0 November 2020 Update allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files. Una ruta ejecutable de servicio sin comillas en McAfee Endpoint Security (ENS) versiones anteriores a 10.7.0, actualización de Noviembre de 2020, permite a usuarios locales causar una denegación de servicio y la ejecución de archivos maliciosos por medio de archivos ejecutables cu... • https://kc.mcafee.com/corporate/index?page=content&id=SB10335 • CWE-428: Unquoted Search Path or Element •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 0

30 Oct 2020 — Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. Check Point Endpoint Security Client para Windows, con blades Anti-Bot o Threat Emulation instalados, antes ... • https://supportcontent.checkpoint.com/solutions?id=sk168081 • CWE-114: Process Control CWE-426: Untrusted Search Path •

CVSS: 6.9EPSS: 0%CPEs: 1EXPL: 0

09 Sep 2020 — Authentication Protection Bypass vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2020 Update allows physical local users to bypass the Windows lock screen via triggering certain detection events while the computer screen is locked and the McTray.exe is running with elevated privileges. This issue is timing dependent and requires physical access to the machine. Una vulnerabilidad de Omisión de Protección de Autenticación en McAfee Endpoint Security (ENS) para Windows ver... • https://kc.mcafee.com/corporate/index?page=content&id=SB10327 • CWE-287: Improper Authentication •

CVSS: 4.7EPSS: 0%CPEs: 1EXPL: 0

09 Sep 2020 — Information Disclosure Vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2020 Update allows local users to gain access to sensitive information via incorrectly logging of sensitive information in debug logs. Una vulnerabilidad de divulgación de información en McAfee Endpoint Security (ENS) para Windows versiones anteriores a 10.7.0 Actualización de Septiembre de 2020, permite a usuarios locales obtener acceso a información confidencial mediante el registro incorrecto de i... • https://kc.mcafee.com/corporate/index?page=content&id=SB10327 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

09 Sep 2020 — Improper Access Control vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2020 Update allows local users to access files which the user otherwise would not have access to via manipulating symbolic links to redirect McAfee file operations to an unintended file. Una vulnerabilidad de Control de Acceso Inapropiado en McAfee Endpoint Security (ENS) para Windows versiones anteriores a 10.7.0 Actualización de Septiembre de 2020, permite a usuarios locales acceder a archivos a l... • https://kc.mcafee.com/corporate/index?page=content&id=SB10327 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.3EPSS: 0%CPEs: 1EXPL: 0

09 Sep 2020 — Protection Mechanism Failure vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2020 Update allows local administrator to temporarily reduce the detection capability allowing otherwise detected malware to run via stopping certain Microsoft services. Una vulnerabilidad de Fallo del Mecanismo de Protección en McAfee Endpoint Security (ENS) para Windows versiones anteriores a 10.7.0 Actualización de Septiembre de 2020, permite al administrador local reducir temporalmente la c... • https://kc.mcafee.com/corporate/index?page=content&id=SB10327 • CWE-693: Protection Mechanism Failure •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

14 Feb 2020 — Improper access control vulnerability in Configuration Tool in McAfee Mcafee Endpoint Security (ENS) Prior to 10.6.1 February 2020 Update allows local users to disable security features via unauthorised use of the configuration tool from older versions of ENS. Una vulnerabilidad de control de acceso inapropiada en Configuration Tool en Mcafee Endpoint Security (ENS) versiones anteriores a 10.6.1. La Actualización de febrero de 2020, permite a usuarios locales deshabilitar las características de seguridad, p... • https://kc.mcafee.com/corporate/index?page=content&id=SB10299 • CWE-358: Improperly Implemented Security Check for Standard CWE-863: Incorrect Authorization •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

29 Aug 2019 — Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user. Check Point Endpoint Security Initial Client para Windows versión anterior a E81.30, intenta cargar una biblioteca DLL localizada en cualquier ubicación de RUTA (PATH) en una imagen limp... • https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM • CWE-114: Process Control CWE-426: Untrusted Search Path •

CVSS: 7.0EPSS: 0%CPEs: 2EXPL: 0

29 Apr 2019 — A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system. Un atacante local puede crear un enlace físico entre un archivo en el cual el cliente para Windows de Check Point Endpoint Security escribe, en versiones anteriores a E80.96, y otro archivo BAT, y luego, haciéndo... • https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk150012 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-65: Windows Hard Link •

CVSS: 7.8EPSS: 0%CPEs: 2EXPL: 3

22 Apr 2019 — A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file. Un enlace físico creado desde el archivo log file de Check Point ZoneAlarm hasta la versión 15.4.062 o el cliente de Check Point Endpoint Security para Windows ant... • https://packetstorm.news/files/id/154754 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-65: Windows Hard Link •