2024-12-08 03:06:42 +00:00

147 lines
4.8 KiB
JSON

{
"id": "CVE-2019-3648",
"sourceIdentifier": "trellixpsirt@trellix.com",
"published": "2019-11-13T09:15:10.877",
"lastModified": "2024-11-21T04:42:17.537",
"vulnStatus": "Modified",
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A Privilege Escalation vulnerability in the Microsoft Windows client in McAfee Total Protection 16.0.R22 and earlier allows administrators to execute arbitrary code via carefully placing malicious files in specific locations protected by administrator permission."
},
{
"lang": "es",
"value": "Una vulnerabilidad de escalada de privilegios en el cliente de Microsoft Windows en McAfee Total Protection versi\u00f3n 16.0.R22 y anteriores, permite a administradores ejecutar c\u00f3digo arbitrario mediante la colocaci\u00f3n cuidadosa de archivos maliciosos dentro de ubicaciones espec\u00edficas protegidas mediante permiso de administrador."
}
],
"metrics": {
"cvssMetricV31": [
{
"source": "trellixpsirt@trellix.com",
"type": "Secondary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "HIGH",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "CHANGED",
"confidentialityImpact": "NONE",
"integrityImpact": "HIGH",
"availabilityImpact": "LOW"
},
"exploitabilityScore": 0.8,
"impactScore": 4.7
},
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "3.1",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H",
"baseScore": 6.7,
"baseSeverity": "MEDIUM",
"attackVector": "LOCAL",
"attackComplexity": "LOW",
"privilegesRequired": "HIGH",
"userInteraction": "NONE",
"scope": "UNCHANGED",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"availabilityImpact": "HIGH"
},
"exploitabilityScore": 0.8,
"impactScore": 5.9
}
],
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C",
"baseScore": 7.2,
"accessVector": "LOCAL",
"accessComplexity": "LOW",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"availabilityImpact": "COMPLETE"
},
"baseSeverity": "HIGH",
"exploitabilityScore": 3.9,
"impactScore": 10.0,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-426"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mcafee:anti-virus_plus:*:*:*:*:*:*:*:*",
"versionEndIncluding": "16.0.r22",
"matchCriteriaId": "10E5C397-E68B-4511-85C0-B3252F5601AB"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mcafee:internet_security:*:*:*:*:*:*:*:*",
"versionEndIncluding": "16.0.r22",
"matchCriteriaId": "0229CEC5-62A2-4A9D-B04A-1533F253CDCA"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mcafee:total_protection:*:*:*:*:*:*:*:*",
"versionEndIncluding": "16.0r22",
"matchCriteriaId": "F541EBA4-75A9-48C2-9E58-2AE1F90AEC23"
}
]
}
]
}
],
"references": [
{
"url": "https://safebreach.com/Post/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648",
"source": "trellixpsirt@trellix.com"
},
{
"url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102984",
"source": "trellixpsirt@trellix.com"
},
{
"url": "https://safebreach.com/Post/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102984",
"source": "af854a3a-2127-422b-91ae-364da2661108"
}
]
}