CVE-2020-7327
McAfee MVEDR - Improperly implemented security check
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Improperly implemented security check in McAfee MVISION Endpoint Detection and Response Client (MVEDR) prior to 3.2.0 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MVEDR failing open rather than closed
Una comprobación de seguridad implementada inapropiadamente en McAfee MVISION Endpoint Detection and Response Client (MVEDR) versiones anteriores a 3.2.0, puede permitir a administradores locales ejecutar código malicioso por medio de la detención de un servicio principal de Windows, dejando el componente de confianza principal de McAfee en un estado inconsistente, resultando en que MVEDR sea abierto erradamente en lugar de cerrarse
CVSS Scores
SSVC
- Decision:-
Timeline
- 2020-01-21 CVE Reserved
- 2020-10-15 CVE Published
- 2023-03-08 EPSS Updated
- 2024-09-17 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-290: Authentication Bypass by Spoofing
CAPEC
References (1)
URL | Tag | Source |
---|---|---|
https://kc.mcafee.com/corporate/index?page=content&id=SB10331 | X_refsource_confirm |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Mcafee Search vendor "Mcafee" | Mvision Endpoint Detection And Response Search vendor "Mcafee" for product "Mvision Endpoint Detection And Response" | < 3.2.0 Search vendor "Mcafee" for product "Mvision Endpoint Detection And Response" and version " < 3.2.0" | - |
Affected
|