6.3
CVSSv3

CVE-2020-7257

Published: 15/04/2020 Updated: 07/11/2023
CVSS v2 Base Score: 3.3 | Impact Score: 4.9 | Exploitability Score: 3.4
CVSS v3 Base Score: 6.3 | Impact Score: 5.2 | Exploitability Score: 1
VMScore: 294
Vector: AV:L/AC:M/Au:N/C:N/I:P/A:P

Vulnerability Summary

Privilege escalation vulnerability in McAfee Endpoint Security (ENS) for Windows before 10.7.0 February 2020 Update allows local users to cause the deletion and creation of files they would not normally have permission to through altering the target of symbolic links whilst an anti-virus scan was in progress. This is timing dependent.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

mcafee endpoint security 10.5.0

mcafee endpoint security 10.5.1

mcafee endpoint security 10.5.2

mcafee endpoint security 10.5.3

mcafee endpoint security 10.5.4

mcafee endpoint security 10.5.5

mcafee endpoint security 10.6.0

Github Repositories

POC for arbitary file deletion using Symlink(Symbolic links) issue present in many Antivirus software

Antivirus-Symlink-Exploit POC for arbitary file deletion using Symlink(Symbolic links) issue present in many Antivirus software Tested with following products Mcafee Endpoint Security (CVE-2020-7257) -> Unpatched(last update-June,2020) Kaspersky Malwarebyte