First published: Fri Sep 17 2021(Updated: )
XML Entity Expansion injection vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 September 2021 Update allows a local user to initiate high CPU and memory consumption resulting in a Denial of Service attack through carefully editing the EPDeploy.xml file and then executing the setup process.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Endpoint Security | <10.7.0 | |
Mcafee Endpoint Security | =10.7.0-april_2020 | |
Mcafee Endpoint Security | =10.7.0-april_2021 | |
Mcafee Endpoint Security | =10.7.0-february_2020 | |
Mcafee Endpoint Security | =10.7.0-february_2021 | |
Mcafee Endpoint Security | =10.7.0-july_2020 | |
Mcafee Endpoint Security | =10.7.0-june_2021 | |
Mcafee Endpoint Security | =10.7.0-november_2020 | |
Mcafee Endpoint Security | =10.7.0-september_2020 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-31842 is an XML Entity Expansion injection vulnerability in McAfee Endpoint Security (ENS) for Windows prior to version 10.7.0 September 2021 Update.
CVE-2021-31842 allows a local user to initiate high CPU and memory consumption resulting in a Denial of Service attack through carefully editing the EPDeploy.xml file and then executing.
CVE-2021-31842 has a severity level of medium with a CVSS score of 5.5.
McAfee Endpoint Security versions prior to 10.7.0 September 2021 Update are affected by CVE-2021-31842.
To fix CVE-2021-31842, users should update their McAfee Endpoint Security to version 10.7.0 September 2021 Update or later.