Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.
AI analysis not yet available
Plain-English explanation, risk summary, and remediation steps will appear here once AI analysis is complete.
No Fix Known
No patch has been released yet. Apply workarounds or mitigations where available.
| Vendor | Product | Versions | Fixed In |
|---|---|---|---|
| mcafee | endpoint_security | - | - |
| mcafee | endpoint_security | - | - |
| mcafee | endpoint_security | - |
Published
CVE disclosed publicly
Last Modified
Most recent update
Indexed to CVEInsight
Added to this platform
AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
7
Affected Products
2
References
mcafee / endpoint_security
| - |
| mcafee | endpoint_security | - | - |
| mcafee | endpoint_security | - | - |
| mcafee | endpoint_security | - | - |
| mcafee | endpoint_security | - | - |
CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Exploitability
Impact