First published: Wed Nov 11 2020(Updated: )
External entity attack vulnerability in the ePO extension in McAfee MVISION Endpoint prior to 20.11 allows remote attackers to gain control of a resource or trigger arbitrary code execution via improper input validation of an HTTP request, where the content for the attack has been loaded into ePO by an ePO administrator.
Credit: psirt@mcafee.com trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee MVISION Endpoint | <20.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2020-7328.
The severity level of CVE-2020-7328 is high (7.2).
The affected software for CVE-2020-7328 is McAfee MVISION Endpoint prior to version 20.11.
Remote attackers can exploit CVE-2020-7328 by gaining control of a resource or triggering arbitrary code execution through improper input validation of an HTTP request.
Yes, a fix is available for CVE-2020-7328. It is recommended to update to version 20.11 or later of McAfee MVISION Endpoint.