First published: Thu May 18 2017(Updated: )
A directory traversal vulnerability in the ePO Extension in McAfee ePolicy Orchestrator (ePO) 5.9.0, 5.3.2, and 5.1.3 and earlier allows remote authenticated users to execute a command of their choice via an authenticated ePO session.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix ePolicy Orchestrator | <=5.1.3 | |
Trellix ePolicy Orchestrator | >=5.3.0<=5.3.3 | |
Trellix ePolicy Orchestrator | >=5.9.0<=5.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-3980 is classified as a critical vulnerability due to its potential for remote command execution.
To remediate CVE-2017-3980, update your McAfee ePolicy Orchestrator to a version later than 5.9.1, 5.3.3, or 5.1.3.
CVE-2017-3980 affects remote authenticated users of McAfee ePolicy Orchestrator versions 5.9.0, 5.3.2, and 5.1.3.
CVE-2017-3980 is a directory traversal vulnerability that allows unauthorized command execution.
There are no known workarounds for CVE-2017-3980 other than upgrading to a patched version of the software.