First published: Tue Jun 09 2020(Updated: )
Privilege Escalation vulnerability during daily DAT updates when using McAfee Virus Scan Enterprise (VSE) prior to 8.8 Patch 15 allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links. This is timing dependent.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Virusscan Enterprise | =8.8 | |
Mcafee Virusscan Enterprise | =8.8-patch1 | |
Mcafee Virusscan Enterprise | =8.8-patch10 | |
Mcafee Virusscan Enterprise | =8.8-patch11 | |
Mcafee Virusscan Enterprise | =8.8-patch12 | |
Mcafee Virusscan Enterprise | =8.8-patch13 | |
Mcafee Virusscan Enterprise | =8.8-patch14 | |
Mcafee Virusscan Enterprise | =8.8-patch2 | |
Mcafee Virusscan Enterprise | =8.8-patch3 | |
Mcafee Virusscan Enterprise | =8.8-patch4 | |
Mcafee Virusscan Enterprise | =8.8-patch5 | |
Mcafee Virusscan Enterprise | =8.8-patch6 | |
Mcafee Virusscan Enterprise | =8.8-patch7 | |
Mcafee Virusscan Enterprise | =8.8-patch8 | |
Mcafee Virusscan Enterprise | =8.8-patch9 | |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7280 is a vulnerability that allows local attackers to escalate privileges on affected installations of McAfee VirusScan Enterprise.
CVE-2020-7280 is classified as a high severity vulnerability with a CVSS score of 7.8.
McAfee VirusScan Enterprise versions 8.8 and its various patches are affected by CVE-2020-7280.
To exploit CVE-2020-7280, an attacker must first obtain the ability to execute low-privileged code on the target system.
You can find more information about CVE-2020-7280 on the McAfee Knowledge Center website and the Zero Day Initiative website.