First published: Wed Jul 15 2020(Updated: )
Inappropriate Encoding for output context vulnerability in McAfee Web Gateway (MWG) prior to 9.2.1 allows a remote attacker to cause MWG to return an ambiguous redirect response via getting a user to click on a malicious URL.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Web Gateway | >=7.8.0<7.8.2.22 | |
McAfee Web Gateway | >=8.2.0<8.2.9 | |
McAfee Web Gateway | >=9.0.0<9.2.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-7292 is a vulnerability in McAfee Web Gateway (MWG) prior to version 9.2.1 that allows a remote attacker to cause MWG to return an ambiguous redirect response via getting a user to click on a malicious URL.
CVE-2020-7292 has a severity rating of 4.3 (medium).
CVE-2020-7292 affects McAfee Web Gateway versions prior to 9.2.1.
A remote attacker can exploit CVE-2020-7292 by getting a user to click on a malicious URL, causing MWG to return an ambiguous redirect response.
Yes, updating McAfee Web Gateway to version 9.2.1 or later resolves the CVE-2020-7292 vulnerability.