// For flags

CVE-2020-7250

ENS symbolic link log file manipulation vulnerability

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.

Una vulnerabilidad de manipulación en enlaces simbólicos en McAfee Endpoint Security (ENS) para Windows versiones anteriores a 10.7.0 Update de Abril de 2020, permite a un usuario local autenticado conseguir una escalada de privilegios al señalar el enlace a archivos que el usuario normalmente no tiene permiso para modificar por medio de enlaces simbólicos cuidadosamente creados desde el directorio del archivo de registro de ENS.

*Credits: McAfee credits Jakub Palaczynski  (ING Tech Poland) and Eran Shimony (CyberArk) for independently reporting this flaw
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
Required
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-21 CVE Reserved
  • 2020-04-15 CVE Published
  • 2023-03-08 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-59: Improper Link Resolution Before File Access ('Link Following')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mcafee
Search vendor "Mcafee"
Endpoint Security
Search vendor "Mcafee" for product "Endpoint Security"
10.5.0
Search vendor "Mcafee" for product "Endpoint Security" and version "10.5.0"
windows
Affected
Mcafee
Search vendor "Mcafee"
Endpoint Security
Search vendor "Mcafee" for product "Endpoint Security"
10.5.1
Search vendor "Mcafee" for product "Endpoint Security" and version "10.5.1"
windows
Affected
Mcafee
Search vendor "Mcafee"
Endpoint Security
Search vendor "Mcafee" for product "Endpoint Security"
10.5.2
Search vendor "Mcafee" for product "Endpoint Security" and version "10.5.2"
windows
Affected
Mcafee
Search vendor "Mcafee"
Endpoint Security
Search vendor "Mcafee" for product "Endpoint Security"
10.5.3
Search vendor "Mcafee" for product "Endpoint Security" and version "10.5.3"
windows
Affected
Mcafee
Search vendor "Mcafee"
Endpoint Security
Search vendor "Mcafee" for product "Endpoint Security"
10.5.4
Search vendor "Mcafee" for product "Endpoint Security" and version "10.5.4"
windows
Affected
Mcafee
Search vendor "Mcafee"
Endpoint Security
Search vendor "Mcafee" for product "Endpoint Security"
10.5.5
Search vendor "Mcafee" for product "Endpoint Security" and version "10.5.5"
windows
Affected
Mcafee
Search vendor "Mcafee"
Endpoint Security
Search vendor "Mcafee" for product "Endpoint Security"
10.6.0
Search vendor "Mcafee" for product "Endpoint Security" and version "10.6.0"
windows
Affected