Page 5 of 58 results (0.008 seconds)

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

14 Apr 2022 — A local privilege escalation vulnerability in MA for Windows prior to 5.7.6 allows a local low privileged user to gain system privileges through running the repair functionality. Temporary file actions were performed on the local user's %TEMP% directory with System privileges through manipulation of symbolic links. Una vulnerabilidad de escalada de privilegios local en MA para Windows versiones anteriores a 5.7.6 permite a un usuario local con pocos privilegios alcanzar privilegios System mediante la ejecuc... • https://kc.mcafee.com/corporate/index?page=content&id=SB10382 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-269: Improper Privilege Management •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

04 Feb 2022 — Local privilege escalation via named pipe due to improper access control checks. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 Una escalada de privilegios local por medio de una tubería con nombre debido a comprobaciones de control de acceso inapropiadas. Los siguientes productos están afectados: Acronis... • https://security-advisory.acronis.com/advisories/SEC-2355 • CWE-285: Improper Authorization •

CVSS: 7.8EPSS: 0%CPEs: 12EXPL: 0

04 Feb 2022 — Local privilege escalation due to excessive permissions assigned to child processes. The following products are affected: Acronis Cyber Protect 15 (Windows) before build 28035, Acronis Agent (Windows) before build 27147, Acronis Cyber Protect Home Office (Windows) before build 39612, Acronis True Image 2021 (Windows) before build 39287 Una escalada de privilegios local debido a permisos excesivos asignados a los procesos hijos. Los siguientes productos están afectados: Acronis Cyber Protect 15 (Windows) ver... • https://security-advisory.acronis.com/advisories/SEC-2881 • CWE-250: Execution with Unnecessary Privileges CWE-276: Incorrect Default Permissions •

CVSS: 7.8EPSS: 1%CPEs: 1EXPL: 0

19 Jan 2022 — A privilege escalation vulnerability in the McAfee Agent prior to 5.7.5. McAfee Agent uses openssl.cnf during the build process to specify the OPENSSLDIR variable as a subdirectory within the installation directory. A low privilege user could have created subdirectories and executed arbitrary code with SYSTEM privileges by creating the appropriate pathway to the specifically created malicious openssl.cnf file. Una vulnerabilidad de escalada de privilegios en McAfee Agent versiones anteriores a 5.7.5. McAfee... • https://kc.mcafee.com/corporate/index?page=content&id=SB10378 • CWE-427: Uncontrolled Search Path Element •

CVSS: 9.3EPSS: 0%CPEs: 1EXPL: 0

19 Jan 2022 — A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges. Una vulnerabilidad de inyección de comandos en McAfee Agent (MA) pa... • https://kc.mcafee.com/corporate/index?page=content&id=SB10378 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

29 Nov 2021 — Sensitive information could be logged. The following products are affected: Acronis Agent (Windows, Linux, macOS) before build 27147 Podría registrarse información confidencial. Los siguientes productos están afectados: Acronis Agent (Windows, Linux, macOS) versiones anteriores a la compilación 27147 • https://security-advisory.acronis.com/advisories/SEC-3145 • CWE-532: Insertion of Sensitive Information into Log File •

CVSS: 8.2EPSS: 0%CPEs: 1EXPL: 0

22 Sep 2021 — Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature. Una vulnerabilidad de control de acceso inapropiado en el proceso de reparación de McAfee Agent pa... • https://kc.mcafee.com/corporate/index?page=content&id=SB10369 • CWE-269: Improper Privilege Management CWE-347: Improper Verification of Cryptographic Signature CWE-427: Uncontrolled Search Path Element •

CVSS: 4.8EPSS: 0%CPEs: 1EXPL: 0

10 Jun 2021 — Improper privilege management vulnerability in McAfee Agent for Windows prior to 5.7.3 allows a local user to modify event information in the MA event folder. This allows a local user to either add false events or remove events from the event logs prior to them being sent to the ePO server. Una vulnerabilidad de gestión de privilegios inapropiada en McAfee Agent para Windows anterior a versión 5.7.3 permite a un usuario local modificar la información de eventos en la carpeta de eventos de MA. Esto permite a... • https://kc.mcafee.com/corporate/index?page=content&id=SB10362 • CWE-269: Improper Privilege Management •

CVSS: 8.8EPSS: 0%CPEs: 7EXPL: 0

20 Jan 2021 — A vulnerability in the web-based management interface of Cisco DNA Center Software could allow an unauthenticated, remote attacker to conduct a cross-site request forgery (CSRF) attack to manipulate an authenticated user into executing malicious actions without their awareness or consent. The vulnerability is due to insufficient CSRF protections for the web-based management interface of an affected device. An attacker could exploit this vulnerability by persuading a web-based management user to follow a spe... • https://kc.mcafee.com/corporate/index?page=content&id=SB10382 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 0

18 Jan 2021 — Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files. Una vulnerabilidad de falta de Autorización en McAfee Agent (MA) para Windows versiones anteriores a 5.7.1, permite a usuarios locales bloquear las actualizaciones de productos de McAfee al manipular un directorio usado por MA para archivos tem... • https://kc.mcafee.com/corporate/index?page=content&id=SB10343 • CWE-862: Missing Authorization •