Description
Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.
Published: 2020-04-15
Score: 8.2 High
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-28377 Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.
History

Mon, 16 Sep 2024 17:30:00 +0000

Type Values Removed Values Added
Title ENS symbolic link log file manipulation vulnerability  ENS symbolic link log file manipulation vulnerability

Subscriptions

Mcafee Endpoint Security
cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-09-16T17:18:05.249Z

Reserved: 2020-01-21T00:00:00.000Z

Link: CVE-2020-7250

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-15T13:15:13.080

Modified: 2024-11-21T05:36:55.620

Link: CVE-2020-7250

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses