First published: Wed Apr 15 2020(Updated: )
Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Endpoint Security | =10.5.0 | |
Mcafee Endpoint Security | =10.5.1 | |
Mcafee Endpoint Security | =10.5.2 | |
Mcafee Endpoint Security | =10.5.3 | |
Mcafee Endpoint Security | =10.5.4 | |
Mcafee Endpoint Security | =10.5.5 | |
Mcafee Endpoint Security | =10.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7250 is a symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update that allows an authenticated local user to potentially gain an escalation of privileges.
The vulnerability allows an authenticated local user to gain escalated privileges by pointing symbolic links to files they do not normally have permission to alter.
McAfee Endpoint Security versions 10.5.0 to 10.6.0 for Windows are affected by CVE-2020-7250.
CVE-2020-7250 has a severity rating of 7.8 (high).
To fix the vulnerability, update McAfee Endpoint Security to version 10.7.0 February 2020 Update or later.