Lucene search

K
cvelistTrellixCVELIST:CVE-2020-7328
HistoryNov 11, 2020 - 9:10 a.m.

CVE-2020-7328 Server-Side Request Forgery (SSRF) in MVISION Endpoint ePO extension

2020-11-1109:10:13
CWE-918
trellix
www.cve.org
7
cve-2020-7328
server-side request forgery
mvision endpoint
epo extension
remote attackers
input validation
http request
arbitrary code execution
external entity attack

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

75.0%

External entity attack vulnerability in the ePO extension in McAfee MVISION Endpoint prior to 20.11 allows remote attackers to gain control of a resource or trigger arbitrary code execution via improper input validation of an HTTP request, where the content for the attack has been loaded into ePO by an ePO administrator.

CNA Affected

[
  {
    "product": "MVISION Endpoint ePO extension",
    "vendor": "McAfee, LLC",
    "versions": [
      {
        "lessThanOrEqual": "20.11",
        "status": "affected",
        "version": "20.x",
        "versionType": "custom"
      }
    ]
  }
]

CVSS3

7.2

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

EPSS

0.004

Percentile

75.0%

Related for CVELIST:CVE-2020-7328