// For flags

CVE-2020-7280

Symbolic Link vulnerability during DAT update

Severity Score

7.8
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Privilege Escalation vulnerability during daily DAT updates when using McAfee Virus Scan Enterprise (VSE) prior to 8.8 Patch 15 allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links. This is timing dependent.

Una vulnerabilidad de escalada de privilegios durante las actualizaciones de DAT diarias cuando se usa McAfee Virus Scan Enterprise (VSE) versiones anteriores a 8.8 Parche 15, permite a usuarios locales causar la eliminación y creación de archivos para los que normalmente no tendrían permiso al alterar el objetivo de los enlaces simbólicos. Esto es dependiente de la sincronización

This vulnerability allows local attackers to escalate privileges on affected installations of McAfee VirusScan Enterprise. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
The specific flaw exists within the processing of log files. By creating a junction, an attacker can abuse the product to overwrite the contents of a chosen file. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM.

*Credits: McAfee credits Glennlloyd working with Trend Micro's Zero Day Initiative for reporting this flaw.
CVSS Scores
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2020-01-21 CVE Reserved
  • 2020-06-10 CVE Published
  • 2024-06-02 EPSS Updated
  • 2024-09-16 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-269: Improper Privilege Management
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch1, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch10, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch11, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch12, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch13, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch14, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch2, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch3, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch4, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch5, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch6, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch7, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch8, windows
Affected
Mcafee
Search vendor "Mcafee"
Virusscan Enterprise
Search vendor "Mcafee" for product "Virusscan Enterprise"
8.8
Search vendor "Mcafee" for product "Virusscan Enterprise" and version "8.8"
patch9, windows
Affected