CVE-2022-3338
McAfee ePolicy Orchestrator vulnerability analysis and mitigation

Overview

An External XML entity (XXE) vulnerability was discovered in McAfee ePolicy Orchestrator (ePO) prior to version 5.10 Update 14. The vulnerability was assigned CVE-2022-3338 and was disclosed on September 27, 2022. This security flaw affects the ePO software, which is a security management platform (CVE Details).

Technical details

The vulnerability is classified as an XML External Entity (XXE) injection, identified as CWE-611. It received a CVSS v3.1 base score of 5.4 (Medium severity) with the vector string CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:N. The vulnerability can be exploited by mimicking the Agent Handler call to ePO and passing carefully constructed XML files through the API (NVD).

Impact

If successfully exploited, this vulnerability could allow an unauthenticated remote attacker to trigger a Server Side Request Forgery (SSRF) attack. This could potentially lead to unauthorized access to internal resources and information disclosure (CVE Details).

Mitigation and workarounds

Users are advised to upgrade to ePO version 5.10 Update 14 or later to address this vulnerability. The fix has been implemented in the updated version to prevent exploitation of the XXE vulnerability (Trellix Advisory).

Additional resources


SourceThis report was generated using AI

Free Vulnerability Assessment

Benchmark your Cloud Security Posture

Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.

Request assessment

Get a personalized demo

Ready to see Wiz in action?

"Best User Experience I have ever seen, provides full visibility to cloud workloads."
David EstlickCISO
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
Adam FletcherChief Security Officer
"We know that if Wiz identifies something as critical, it actually is."
Greg PoniatowskiHead of Threat and Vulnerability Management