CVE-2020-7327

Improperly implemented security check in McAfee MVISION Endpoint Detection and Response Client (MVEDR) prior to 3.2.0 may allow local administrators to execute malicious code via stopping a core Windows service leaving McAfee core trust component in an inconsistent state resulting in MVEDR failing open rather than closed
Configurations

Configuration 1 (hide)

cpe:2.3:a:mcafee:mvision_endpoint_detection_and_response:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:37

Type Values Removed Values Added
CVSS v2 : 4.6
v3 : 6.7
v2 : 4.6
v3 : 6.0
References () https://kc.mcafee.com/corporate/index?page=content&id=SB10331 - () https://kc.mcafee.com/corporate/index?page=content&id=SB10331 -

07 Nov 2023, 03:26

Type Values Removed Values Added
References (CONFIRM) https://kc.mcafee.com/corporate/index?page=content&id=SB10331 - Patch, Vendor Advisory () https://kc.mcafee.com/corporate/index?page=content&id=SB10331 -
CWE CWE-290

Information

Published : 2020-10-15 10:15

Updated : 2024-11-21 05:37


NVD link : CVE-2020-7327

Mitre link : CVE-2020-7327

CVE.ORG link : CVE-2020-7327


JSON object : View

Products Affected

mcafee

  • mvision_endpoint_detection_and_response
CWE
CWE-290

Authentication Bypass by Spoofing