First published: Fri Jun 15 2018(Updated: )
Application Protection Bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
Trellix ePolicy Orchestrator | >=5.3.0<=5.3.3 | |
Trellix ePolicy Orchestrator | >=5.9.0<=5.9.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-6671 has a medium severity rating, indicating a potential security risk for affected systems.
To fix CVE-2018-6671, upgrade your McAfee ePolicy Orchestrator to a version that is not vulnerable, such as 5.3.4 or 5.9.2 and above.
CVE-2018-6671 affects McAfee ePolicy Orchestrator versions 5.3.0 to 5.3.3 and 5.9.0 to 5.9.1.
CVE-2018-6671 is an Application Protection Bypass vulnerability that allows remote authenticated users to circumvent security restraints.
Yes, CVE-2018-6671 can be exploited remotely by authenticated users through specially crafted HTTP requests.