CVE-2020-7267
Published May 8, 2020
Last updated a year ago
Overview
- Description
- Privilege Escalation vulnerability in McAfee VirusScan Enterprise (VSE) for Linux prior to 2.0.3 Hotfix 2635000 allows local users to delete files the user would otherwise not have access to via manipulating symbolic links to redirect a McAfee delete action to an unintended file. This is achieved through running a malicious script or program on the target machine.
- Source
- trellixpsirt@trellix.com
- NVD status
- Modified
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 8.4
- Impact score
- 5.8
- Exploitability score
- 2
- Vector string
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:H
- Severity
- HIGH
CVSS 2.0
- Type
- Primary
- Base score
- 3.6
- Impact score
- 4.9
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:N/I:P/A:P
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:-:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "A0280F82-EC6B-4F5B-A495-DD9CEED6A20D" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch1:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "66F4B2B4-93EF-4BF2-A949-4EABB6E2D5CD" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch10:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "8915A4A0-A6A8-433C-9E03-2FE2023E576D" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch11:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "12630925-6631-40DB-84EF-35BFE6EFB4F7" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch12:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "8EB533F2-0631-4C2C-885A-C132EC937164" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch13:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "D17EC9A7-A383-4B3E-A292-73CD33E60134" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch2:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "1204EDA4-8C76-45D1-894A-CBD042A1C533" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch3:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "BB3F4704-7A78-4223-98A6-EAE027553732" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch4:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "D0545B55-45D8-440D-A120-F0ED7337CF06" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch5:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "3CDA7115-7071-42BC-99AA-FD01A5CB6D37" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch6:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "54AC8CF5-30D5-4FF8-83C8-70FF9E16FE00" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch7:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "5D98604B-B10B-473A-A219-BF6208779912" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch8:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "923A8D73-6FAB-4826-B6BD-6D006E46C7BE" }, { "criteria": "cpe:2.3:a:mcafee:virusscan_enterprise:8.8:patch9:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "1846CE6C-EDAE-4F88-8CC3-2C48506595F7" } ], "operator": "OR" } ] } ]