Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-28377 | Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Mon, 16 Sep 2024 17:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Title | ENS symbolic link log file manipulation vulnerability  | ENS symbolic link log file manipulation vulnerability |
Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2024-09-16T17:18:05.249Z
Reserved: 2020-01-21T00:00:00
Link: CVE-2020-7250
No data.
Status : Modified
Published: 2020-04-15T13:15:13.080
Modified: 2024-11-21T05:36:55.620
Link: CVE-2020-7250
No data.
OpenCVE Enrichment
No data.
EUVD