CVE-2021-31224
https://notcve.org/view.php?id=CVE-2021-31224
SES Evolution before 2.1.0 allows duplicating an existing security policy by leveraging access of a user having read-only access to security policies. SES Evolution versiones anteriores a 2.1.0, permite duplicar una política de seguridad existente al aprovechar el acceso de un usuario con acceso de sólo lectura a las políticas de seguridad • https://advisories.stormshield.eu https://advisories.stormshield.eu/2021-026 •
CVE-2021-35957
https://notcve.org/view.php?id=CVE-2021-35957
Stormshield Endpoint Security Evolution 2.0.0 through 2.0.2 does not accomplish the intended defense against local administrators who can replace the Visual C++ runtime DLLs (in %WINDIR%\system32) with malicious ones. Stormshield Endpoint Security Evolution versiones 2.0.0 hasta 2.0.2, no logra la defensa prevista contra los administradores locales que pueden reemplazar las DLL de tiempo de ejecución de Visual C++ (en %WINDIR%\system32) por otras maliciosas • https://advisories.stormshield.eu https://advisories.stormshield.eu/2021-045 • CWE-427: Uncontrolled Search Path Element •
CVE-2021-31225
https://notcve.org/view.php?id=CVE-2021-31225
SES Evolution before 2.1.0 allows deleting some resources not currently in use by any security policy by leveraging access to a computer having the administration console installed. SES Evolution versiones anteriores a 2.1.0, permite borrar algunos recursos que no están en uso por ninguna política de seguridad al aprovechar el acceso a un ordenador que tenga instalada la consola de administración • https://advisories.stormshield.eu https://advisories.stormshield.eu/2021-027 •
CVE-2020-7308 – Transmission of data in clear text by McAfee ENS
https://notcve.org/view.php?id=CVE-2020-7308
Cleartext Transmission of Sensitive Information between McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update and McAfee Global Threat Intelligence (GTI) servers using DNS allows a remote attacker to view the requests from ENS and responses from GTI over DNS. By gaining control of an intermediate DNS server or altering the network DNS configuration, it is possible for an attacker to intercept requests and send their own responses. Una transmisión de Texto Sin Cifrar de Información Confidencial entre McAfee Endpoint Security (ENS) para Windows anterior a versión 10.7.0 Update de Febrero de 2021 y los servidores de McAfee Global Threat Intelligence (GTI) que usan DNS permite a un atacante remoto visualizar unas peticiones de ENS y unas respuestas de GTI por medio de DNS. Al conseguir el control de un servidor DNS intermedio o alterar la configuración del DNS de la red, es posible a un atacante interceptar peticiones y enviar sus propias respuestas • https://kc.mcafee.com/corporate/index?page=content&id=SB10354 • CWE-319: Cleartext Transmission of Sensitive Information •
CVE-2020-26200
https://notcve.org/view.php?id=CVE-2020-26200
A component of Kaspersky custom boot loader allowed loading of untrusted UEFI modules due to insufficient check of their authenticity. This component is incorporated in Kaspersky Rescue Disk (KRD) and was trusted by the Authentication Agent of Full Disk Encryption in Kaspersky Endpoint Security (KES). This issue allowed to bypass the UEFI Secure Boot security feature. An attacker would need physical access to the computer to exploit it. Otherwise, local administrator privileges would be required to modify the boot loader component. • https://github.com/CVEProject/cvelist/blob/master/2020/26xxx/CVE-2020-26200.json https://support.kaspersky.com/general/vulnerability.aspx?el=12430#170221 • CWE-287: Improper Authentication •