Lucene search

K
cvelistTrellixCVELIST:CVE-2020-7323
HistorySep 08, 2020 - 12:00 a.m.

CVE-2020-7323 Authentication Protection Bypass vulnerability in ENS for Windows

2020-09-0800:00:00
CWE-287
trellix
www.cve.org
1

6.9 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.0%

Authentication Protection Bypass vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2020 Update allows physical local users to bypass the Windows lock screen via triggering certain detection events while the computer screen is locked and the McTray.exe is running with elevated privileges. This issue is timing dependent and requires physical access to the machine.

CNA Affected

[
  {
    "product": "Endpoint Security for Windows ",
    "vendor": "McAfee LLC",
    "versions": [
      {
        "lessThan": "10.7.0 September 2020 Update",
        "status": "affected",
        "version": "10.7.x",
        "versionType": "custom"
      }
    ]
  }
]

6.9 Medium

CVSS3

Attack Vector

PHYSICAL

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

LOW

CVSS:3.1/AV:P/AC:H/PR:N/UI:R/S:C/C:H/I:H/A:L

6.4 Medium

AI Score

Confidence

High

0.001 Low

EPSS

Percentile

25.0%

Related for CVELIST:CVE-2020-7323