Description
Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration.
Published: 2020-04-15
Score: 3.9 Low
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2020-28382 Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration.
History

Mon, 16 Sep 2024 22:15:00 +0000

Type Values Removed Values Added
Title Privilege Escalation vulnerability  in ENS  Privilege Escalation vulnerability  in ENS

Subscriptions

Mcafee Endpoint Security
cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-09-16T22:01:36.891Z

Reserved: 2020-01-21T00:00:00.000Z

Link: CVE-2020-7255

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2020-04-15T13:15:13.267

Modified: 2024-11-21T05:36:56.197

Link: CVE-2020-7255

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses