Lucene search

K
cvelistTrellixCVELIST:CVE-2018-6690
HistorySep 18, 2018 - 10:00 p.m.

CVE-2018-6690 McAfee Application Control (MAC) - Whitelist bypass using a hard drive solidified by MACC

2018-09-1822:00:00
trellix
www.cve.org

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Accessing, modifying, or executing executable files vulnerability in Microsoft Windows client in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier allows authenticated users to execute arbitrary code via file transfer from external system.

CNA Affected

[
  {
    "platforms": [
      "x86"
    ],
    "product": "McAfee Application Control (MAC)",
    "vendor": "McAfee",
    "versions": [
      {
        "lessThanOrEqual": "8.0.0 HF 4",
        "status": "affected",
        "version": "8.0.0 HF 4",
        "versionType": "custom"
      }
    ]
  }
]

6.1 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:N

7.1 High

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

12.7%

Related for CVELIST:CVE-2018-6690