mcafee agent CVE-2020-7253 is a vulnerability in McAfee Agent
Published on March 12, 2020

Improper access control vulnerability in McAfee Agent
Improper access control vulnerability in masvc.exe in McAfee Agent (MA) prior to 5.6.4 allows local users with administrator privileges to disable self-protection via a McAfee supplied command-line utility.

NVD

Vulnerability Analysis

CVE-2020-7253 can be exploited with local system access, and requires user privileges. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality, a high impact on integrity and availability.

Attack Vector:
LOCAL
Attack Complexity:
HIGH
Privileges Required:
HIGH
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
HIGH
Availability Impact:
HIGH

Weakness Type

What is an Authorization Vulnerability?

The software does not restrict or incorrectly restricts access to a resource from an unauthorized actor.

CVE-2020-7253 has been classified to as an Authorization vulnerability or weakness.


Products Associated with CVE-2020-7253

Want to know whenever a new CVE is published for McAfee Agent? stack.watch will email you.

 

Affected Versions

McAfee, LLC McAfee Agent (MA):

Exploit Probability

EPSS
0.11%
Percentile
28.78%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.