Show plain JSON{"id": "CVE-2020-7278", "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:N", "authentication": "SINGLE", "integrityImpact": "PARTIAL", "accessComplexity": "LOW", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}], "cvssMetricV31": [{"type": "Secondary", "source": "trellixpsirt@trellix.com", "cvssData": {"scope": "CHANGED", "version": "3.1", "baseScore": 7.4, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:L/A:L", "integrityImpact": "LOW", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "LOW", "privilegesRequired": "LOW", "confidentialityImpact": "LOW"}, "impactScore": 3.7, "exploitabilityScore": 3.1}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 6.5, "attackVector": "NETWORK", "baseSeverity": "MEDIUM", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N", "integrityImpact": "HIGH", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "LOW", "confidentialityImpact": "NONE"}, "impactScore": 3.6, "exploitabilityScore": 2.8}]}, "published": "2020-04-15T10:15:13.857", "references": [{"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10309", "source": "trellixpsirt@trellix.com"}, {"url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10309", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "trellixpsirt@trellix.com", "description": [{"lang": "en", "value": "CWE-284"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-862"}]}], "descriptions": [{"lang": "en", "value": "Exploiting incorrectly configured access control security levels vulnerability in ENS Firewall in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 April 2020 and 10.6.1 April 2020 updates allows remote attackers and local users to allow or block unauthorized traffic via pre-existing rules not being handled correctly when updating to the February 2020 updates."}, {"lang": "es", "value": "Una vulnerabilidad de explotaci\u00f3n de los niveles de seguridad de control de acceso configurados incorrectamente en ENS Firewall en McAfee Endpoint Security (ENS) para Windows versiones anteriores 10.7.0 Update de Abril de 2020 y versiones anteriores a 10.6.1, Update de Abril de 2020, permite a atacantes remotos y usuarios locales habilitar o bloquear el tr\u00e1fico no autorizado por medio de reglas preexistentes que no han sido manejadas correctamente en la actualizaci\u00f3n de febrero de 2020."}], "lastModified": "2024-11-21T05:36:58.597", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "6AC514CA-D094-433D-9561-99048D43902F"}, {"criteria": "cpe:2.3:a:mcafee:endpoint_security:10.5.1:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "1B7AE3E9-DDCE-4119-B57D-B3D471E05B16"}, {"criteria": "cpe:2.3:a:mcafee:endpoint_security:10.5.2:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "603FE358-FADA-4FE6-B3F2-169D032A57E9"}, {"criteria": "cpe:2.3:a:mcafee:endpoint_security:10.5.3:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "66461D42-AE21-41B3-9FCB-3F6D09AC323E"}, {"criteria": "cpe:2.3:a:mcafee:endpoint_security:10.5.4:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "DCC441CF-5EA0-41C1-AE15-6672FF20B73A"}, {"criteria": "cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "A6551AB4-1B0F-4EE3-8ED1-99413E3F19DD"}, {"criteria": "cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:windows:*:*", "vulnerable": true, "matchCriteriaId": "94732038-F35D-41AB-A550-E6F5FF9004DF"}], "operator": "OR"}]}], "sourceIdentifier": "trellixpsirt@trellix.com"}