CVE Vulnerabilities

CVE-2020-7250

Improper Link Resolution Before File Access ('Link Following')

Published: Apr 15, 2020 | Modified: Nov 07, 2023
CVSS 3.x
7.8
HIGH
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
4.6 MEDIUM
AV:L/AC:L/Au:N/C:P/I:P/A:P
RedHat/V2
RedHat/V3
Ubuntu

Symbolic link manipulation vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows authenticated local user to potentially gain an escalation of privileges by pointing the link to files which the user which not normally have permission to alter via carefully creating symbolic links from the ENS log file directory.

Weakness

The product attempts to access a file based on the filename, but it does not properly prevent that filename from identifying a link or shortcut that resolves to an unintended resource.

Affected Software

Name Vendor Start Version End Version
Endpoint_security Mcafee 10.5.0 (including) 10.5.0 (including)
Endpoint_security Mcafee 10.5.1 (including) 10.5.1 (including)
Endpoint_security Mcafee 10.5.2 (including) 10.5.2 (including)
Endpoint_security Mcafee 10.5.3 (including) 10.5.3 (including)
Endpoint_security Mcafee 10.5.4 (including) 10.5.4 (including)
Endpoint_security Mcafee 10.5.5 (including) 10.5.5 (including)
Endpoint_security Mcafee 10.6.0 (including) 10.6.0 (including)

Potential Mitigations

  • Follow the principle of least privilege when assigning access rights to entities in a software system.
  • Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.

References