cvelist/2020/7xxx/CVE-2020-7346.json

88 lines
3.0 KiB
JSON
Raw Normal View History

2020-01-21 14:01:28 +00:00
{
2022-12-20 09:00:37 +00:00
"data_version": "4.0",
"data_type": "CVE",
"data_format": "MITRE",
2020-01-21 14:01:28 +00:00
"CVE_data_meta": {
"ID": "CVE-2020-7346",
2022-12-20 09:00:37 +00:00
"ASSIGNER": "trellixpsirt@trellix.com",
"STATE": "PUBLIC"
},
"description": {
"description_data": [
{
"lang": "eng",
"value": "Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) for Windows prior to 11.6.100 allows a local, low privileged, attacker through the use of junctions to cause the product to load DLLs of the attacker's choosing. This requires the creation and removal of junctions by the attacker along with sending a specific IOTL command at the correct time."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-59: Improper Link Resolution Before File Access ('Link Following')",
"cweId": "CWE-59"
}
]
}
]
2020-01-21 14:01:28 +00:00
},
2021-03-23 16:02:16 +00:00
"affects": {
"vendor": {
"vendor_data": [
{
2022-12-20 09:00:37 +00:00
"vendor_name": "McAfee,LLC",
2021-03-23 16:02:16 +00:00
"product": {
"product_data": [
{
"product_name": "McAfee Data Loss Prevention (DLP) Endpoint for Windows",
"version": {
"version_data": [
{
2022-12-20 09:00:37 +00:00
"version_value": "unspecified",
"version_affected": "="
2021-03-23 16:02:16 +00:00
}
]
}
}
]
2022-12-20 09:00:37 +00:00
}
2021-03-23 16:02:16 +00:00
}
]
}
},
2022-12-20 09:00:37 +00:00
"references": {
"reference_data": [
2020-01-21 14:01:28 +00:00
{
2022-12-20 09:00:37 +00:00
"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10344",
"refsource": "MISC",
"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10344"
2021-03-23 16:02:16 +00:00
}
]
},
"generator": {
"engine": "Vulnogram 0.0.9"
},
2022-12-20 09:00:37 +00:00
"source": {
"discovery": "EXTERNAL"
2021-03-23 16:02:16 +00:00
},
2022-12-20 09:00:37 +00:00
"impact": {
"cvss": [
2021-03-23 16:02:16 +00:00
{
2022-12-20 09:00:37 +00:00
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "HIGH",
"baseScore": 7.8,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
2021-03-23 16:02:16 +00:00
}
]
2020-01-21 14:01:28 +00:00
}
2022-12-20 09:00:37 +00:00
}