mcafee agent CVE-2020-7343 is a vulnerability in McAfee Agent
Published on January 18, 2021

Improper Authorization vulnerability in MA
Missing Authorization vulnerability in McAfee Agent (MA) for Windows prior to 5.7.1 allows local users to block McAfee product updates by manipulating a directory used by MA for temporary files. The product would continue to function with out-of-date detection files.

NVD

Vulnerability Analysis

CVE-2020-7343 can be exploited with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have no impact on confidentiality and integrity, and a high impact on availability.

Attack Vector:
LOCAL
Attack Complexity:
LOW
Privileges Required:
LOW
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
NONE
Integrity Impact:
NONE
Availability Impact:
HIGH

Weakness Type

What is an AuthZ Vulnerability?

The software does not perform an authorization check when an actor attempts to access a resource or perform an action.

CVE-2020-7343 has been classified to as an AuthZ vulnerability or weakness.


Products Associated with CVE-2020-7343

Want to know whenever a new CVE is published for McAfee Agent? stack.watch will email you.

 

Affected Versions

McAfee, LLC McAfee Agent:

Exploit Probability

EPSS
0.15%
Percentile
35.54%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.