McAfee Endpoint Security for Windows < 10.6.1 / 10.7.0 February 2021 Update Multiple Vulnerabilities (SB10345)

medium Nessus Plugin ID 146620

Synopsis

The remote host is affected by multiple vulnerabilities.

Description

The version of the McAfee Endpoint Security (ENS) for Windows installed on the remote Windows host is affected by multiple vulnerabilities, as follows:

- Clear text storage of sensitive Information in memory vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows a local user to view ENS settings and credentials via accessing process memory after the ENS administrator has performed specific actions. To exploit this, the local user has to access the relevant memory location immediately after an ENS administrator has made a configuration change through the console on their machine. (CVE-2021-23878)
- A stored cross site scripting vulnerability in ePO extension of McAfee Endpoint Security (ENS) prior to 10.7.0 February 2021 Update allows an ENS ePO administrator to add a script to a policy event which will trigger the script to be run through a browser block page when a local non-administrator user triggers the policy. (CVE-2021-23881)
- Improper Access Control vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows local administrators to prevent the installation of some ENS files by placing carefully crafted files where ENS will be installed. This is only applicable to clean installations of ENS as the Access Control rules will prevent modification prior to an upgrade. (CVE-2021-23882)
- A Null Pointer Dereference vulnerability in McAfee Endpoint Security (ENS) for Windows prior to 10.7.0 February 2021 Update allows a local administrator to cause Windows to crash via a specific system call which is not handled correctly. This varies by machine and had partial protection prior to this update. (CVE-2021-23883)

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Apply the 10.7.0 or 10.6.1 February 2021 Update or later.

See Also

https://kc.mcafee.com/corporate/index?page=content&id=SB10345

Plugin Details

Severity: Medium

ID: 146620

File Name: mcafee_ens_SB10345.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 2/19/2021

Updated: 2/25/2021

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.6

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:N/A:N

CVSS Score Source: CVE-2021-23878

CVSS v3

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.4

Vector: CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:N/A:N

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:mcafee:endpoint_security

Required KB Items: SMB/Registry/Enumerated, installed_sw/McAfee Endpoint Security Platform

Exploit Ease: No known exploits are available

Patch Publication Date: 2/9/2021

Vulnerability Publication Date: 2/9/2021

Reference Information

CVE: CVE-2021-23878, CVE-2021-23881, CVE-2021-23882, CVE-2021-23883

IAVA: 2021-A-0102

MCAFEE-SB: SB10345