
Cloud Vulnerability DB
A community-led vulnerabilities database
A symbolic link manipulation vulnerability was identified in McAfee Endpoint Security (ENS) for Windows versions prior to 10.7.0 February 2020 Update. The vulnerability, tracked as CVE-2020-7250, was discovered and assigned on January 21, 2020. This security flaw affects the Windows version of McAfee ENS, a widely-used endpoint protection platform (CVE Details).
The vulnerability involves a symbolic link manipulation issue where authenticated local users could exploit the ENS log file directory through carefully crafted symbolic links. The technical nature of the vulnerability relates to file permission manipulation, specifically targeting the ENS log file directory (NVD).
The vulnerability could lead to privilege escalation, allowing authenticated local users to gain access to files they would not normally have permission to alter (CVE Details).
McAfee released a patch in the 10.7.0 February 2020 Update to address this vulnerability. Users are advised to upgrade to this version or later to mitigate the risk (McAfee Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."