First published: Tue Mar 14 2017(Updated: )
Unquoted executable path vulnerability in Client Management and Gateway components in McAfee (now Intel Security) ePO Deep Command (eDC) 2.2 and 2.1 allows authenticated users to execute a command of their choice via dropping a malicious file for the path.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee ePO Deep Command | =2.1 | |
McAfee ePO Deep Command | =2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8988 has been assigned a moderate severity rating due to the potential for authenticated users to execute arbitrary commands.
To remediate CVE-2015-8988, update your McAfee ePO Deep Command to a version that addresses this vulnerability.
CVE-2015-8988 affects McAfee ePO Deep Command versions 2.1 and 2.2.
An unquoted executable path vulnerability allows an attacker to place a malicious file in a path where it can be executed without quotations, potentially leading to command execution.
Authenticated users with access to the McAfee ePO Deep Command can exploit the vulnerability described in CVE-2015-8988.