{"containers":{"cna":{"affected":[{"product":"McAfee Endpoint Security (ENS)","vendor":"McAfee LLC","versions":[{"lessThan":"10.7.0 April 2020 Update","status":"affected","version":"10.x","versionType":"custom"}]}],"credits":[{"lang":"en","value":"McAfee  credits  Lockheed Martin Red Team for   reporting this flaw"}],"datePublic":"2020-04-14T00:00:00.000Z","descriptions":[{"lang":"en","value":"Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration."}],"metrics":[{"cvssV3_1":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":3.9,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L","version":"3.1"}}],"problemTypes":[{"descriptions":[{"cweId":"CWE-264","description":"CWE-264 Permissions, Privileges, and Access Controls","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2020-04-15T12:45:20.000Z","orgId":"01626437-bf8f-4d1c-912a-893b5eb04808","shortName":"trellix"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10309"}],"source":{"discovery":"EXTERNAL"},"title":"Privilege Escalation vulnerability  in ENS","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"psirt@mcafee.com","DATE_PUBLIC":"2020-04-14T00:00:00.000Z","ID":"CVE-2020-7255","STATE":"PUBLIC","TITLE":"Privilege Escalation vulnerability  in ENS"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"McAfee Endpoint Security (ENS)","version":{"version_data":[{"version_affected":"<","version_name":"10.x","version_value":"10.7.0 April 2020 Update"}]}}]},"vendor_name":"McAfee LLC"}]}},"credit":[{"lang":"eng","value":"McAfee  credits  Lockheed Martin Red Team for   reporting this flaw"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Privilege escalation vulnerability in the administrative user interface in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2020 Update allows local users to gain elevated privileges via ENS not checking user permissions when editing configuration in the ENS client interface. Administrators can lock the ENS client interface through ePO to prevent users being able to edit the configuration."}]},"generator":{"engine":"Vulnogram 0.0.9"},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"LOCAL","availabilityImpact":"LOW","baseScore":3.9,"baseSeverity":"LOW","confidentialityImpact":"NONE","integrityImpact":"LOW","privilegesRequired":"LOW","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.1/AV:L/AC:H/PR:L/UI:R/S:C/C:N/I:L/A:L","version":"3.1"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-264 Permissions, Privileges, and Access Controls"}]}]},"references":{"reference_data":[{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10309","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10309"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-04T09:25:48.605Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10309"}]}]},"cveMetadata":{"assignerOrgId":"01626437-bf8f-4d1c-912a-893b5eb04808","assignerShortName":"trellix","cveId":"CVE-2020-7255","datePublished":"2020-04-15T12:45:20.103Z","dateReserved":"2020-01-21T00:00:00.000Z","dateUpdated":"2024-09-16T22:01:36.891Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}