CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
7.3 | $0-$5k | 0.00 |
A vulnerability has been found in McAfee ePolicy Orchestrator 2.x/3.x (Endpoint Management Software) and classified as critical. This vulnerability affects an unknown code. The manipulation with an unknown input leads to a privileges management vulnerability. The CWE definition for the vulnerability is CWE-269. The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor. As an impact it is known to affect confidentiality, integrity, and availability. CVE summarizes:
McAfee ePolicy Orchestrator (ePO) 2.5.1 Patch 13 and 3.0 SP2a Patch 3 allows remote attackers to execute arbitrary commands via certain HTTP POST requests to the spipe/file handler on ePO TCP port 81.
The bug was discovered 04/23/2004. The weakness was shared 04/23/2004 by Ben Layer (ERNE) with McAfee (Website). The advisory is available at secunia.com. This vulnerability was named CVE-2004-0038 since 01/07/2004. The attack needs to be initiated within the local network. No form of authentication is required for a successful exploitation. The technical details are unknown and an exploit is not available. This vulnerability is assigned to T1068 by the MITRE ATT&CK project.
Upgrading to version 2.5.1 eliminates this vulnerability. Applying a patch is able to eliminate this problem. The bugfix is ready for download at download.nai.com. The best possible mitigation is suggested to be patching the affected component. Attack attempts may be identified with Snort ID 2562.
The vulnerability is also documented in the vulnerability database at X-Force (14166). Additional details are provided at download.nai.com.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.6VulDB Meta Temp Score: 7.3
VulDB Base Score: 7.6
VulDB Temp Score: 7.3
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Privileges managementCWE: CWE-269 / CWE-266
CAPEC: 🔍
ATT&CK: 🔍
Local: No
Remote: Partially
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
Upgrade: ePolicy Orchestrator 2.5.1
Patch: download.nai.com
Snort ID: 2562
Snort Message: SERVER-WEBAPP McAfee ePO file upload attempt
Snort Class: 🔍
SourceFire IPS: 🔍
ISS Proventia IPS: 🔍
Timeline
01/07/2004 🔍04/23/2004 🔍
04/23/2004 🔍
04/23/2004 🔍
04/23/2004 🔍
04/23/2004 🔍
04/26/2004 🔍
04/28/2004 🔍
06/14/2004 🔍
06/28/2019 🔍
Sources
Vendor: mcafee.comAdvisory: secunia.com⛔
Researcher: Ben Layer (ERNE)
Organization: McAfee
Status: Not defined
Confirmation: 🔍
CVE: CVE-2004-0038 (🔍)
X-Force: 14166 - McAfee ePolicy Orchestrator command execution, High Risk
Vulnerability Center: 4205 - McAfee ePolicy Orchestrator Allows Administrator Access to the ePo Server, High
SecurityFocus: 10200 - McAfee ePolicy Orchestrator Server Remote Code Execution Vulnerability
Secunia: 11471 - McAfee ePolicy Orchestrator HTTP POST Request Handling Vulnerability, Moderately Critical
OSVDB: 5626 - McAfee ePolicy Orchestrator HTTP POST spipe/file Handler Arbitrary File Creation
Misc.: 🔍
Entry
Created: 04/26/2004 15:16Updated: 06/28/2019 10:44
Changes: 04/26/2004 15:16 (87), 06/28/2019 10:44 (2)
Complete: 🔍
Cache ID: 18:E55:103
No comments yet. Languages: en.
Please log in to comment.