First published: Mon Feb 17 2020(Updated: )
Unquoted service executable path in DXL Broker in McAfee Data eXchange Layer (DXL) Framework 6.0.0 and earlier allows local users to cause a denial of service and malicious file execution via carefully crafted and named executable files.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Data eXchange Layer | <=6.0.0 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for the unquoted service executable path in DXL Broker is CVE-2020-7252.
The affected software for CVE-2020-7252 is McAfee Data eXchange Layer (DXL) Framework 6.0.0 and earlier.
A local user can exploit CVE-2020-7252 by carefully crafting and naming executable files.
The severity of CVE-2020-7252 is medium, with a severity value of 5.5.
To fix the unquoted service executable path vulnerability in DXL Broker, McAfee recommends applying the necessary patches or updates provided by the vendor.