CVE-2022-0858
Published Mar 23, 2022
Last updated a year ago
Overview
- Description
- A cross-site scripting (XSS) vulnerability in McAfee Enterprise ePolicy Orchestrator (ePO) prior to 5.10 Update 13 allows a remote attacker to potentially obtain access to an ePO administrator's session by convincing the attacker to click on a carefully crafted link. This would lead to limited ability to alter some information in ePO due to the area of the User Interface the vulnerability is present in.
- Source
- trellixpsirt@trellix.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 4.7
- Impact score
- 1.4
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N
- Severity
- MEDIUM
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A30F7908-5AF6-4761-BC6A-4C18EFAE48E5", "versionEndExcluding": "5.10.0" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F30D3AF-4FA3-4B7A-BE04-C24E2EA19A95" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7B00DDE7-7002-45BE-8EDE-65D964922CB0" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DB88C165-BB24-49FB-AAF6-087A766D5AD1" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_11:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C879487A-3378-4C5D-9DA6-308D06B786A0" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_12:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "523E143F-E8B3-4B24-AD64-65BF5A8677A7" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF806B52-DAD5-4D12-8BB6-3CBF9DC6B8DF" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DE847E0-431D-497D-9C57-C4E59749F6A0" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46385384-5561-40AA-9FDE-A2DE4FDFAD3E" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B7CA7CA6-7CF2-48F6-81B5-69BA0A37EF4E" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9E4E5481-1070-4E1F-8679-1985DE4E785A" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9EEA681-67FF-43B3-8610-0FA17FD279E5" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C33BA8EA-793D-4E79-BE9C-235ACE717216" }, { "criteria": "cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "823DBE80-CB8D-4981-AE7C-28F3FDD40451" } ], "operator": "OR" } ] } ]