Show plain JSON{"containers": {"cna": {"affected": [{"product": "ePolicy Orchestrator (ePO)", "vendor": "McAfee", "versions": [{"lessThan": "5.3.3 with hotfix EPO5xHF1229850", "status": "affected", "version": "5.3.0 through 5.3.3", "versionType": "custom"}, {"lessThan": "5.9.1 with hotfix EPO5xHF1229850", "status": "affected", "version": "5.9.0 through 5.9.1", "versionType": "custom"}]}], "datePublic": "2018-06-14T00:00:00", "descriptions": [{"lang": "en", "value": "Application Protection Bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request."}], "metrics": [{"cvssV3_0": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}}], "problemTypes": [{"descriptions": [{"description": "Application Protection Bypass vulnerability\n", "lang": "en", "type": "text"}]}], "providerMetadata": {"dateUpdated": "2019-03-09T10:57:01", "orgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "shortName": "trellix"}, "references": [{"name": "104485", "tags": ["vdb-entry", "x_refsource_BID"], "url": "http://www.securityfocus.com/bid/104485"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10240"}, {"name": "46518", "tags": ["exploit", "x_refsource_EXPLOIT-DB"], "url": "https://www.exploit-db.com/exploits/46518/"}, {"name": "1041155", "tags": ["vdb-entry", "x_refsource_SECTRACK"], "url": "http://www.securitytracker.com/id/1041155"}], "source": {"advisory": "SB10240", "discovery": "INTERNAL"}, "title": "SB10240 - ePolicy Orchestrator (ePO) - Application Protection Bypass vulnerability", "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "psirt@mcafee.com", "ID": "CVE-2018-6671", "STATE": "PUBLIC", "TITLE": "SB10240 - ePolicy Orchestrator (ePO) - Application Protection Bypass vulnerability"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "ePolicy Orchestrator (ePO)", "version": {"version_data": [{"affected": "<", "version_affected": "<", "version_name": "5.3.0 through 5.3.3", "version_value": "5.3.3 with hotfix EPO5xHF1229850"}, {"affected": "<", "version_affected": "<", "version_name": "5.9.0 through 5.9.1", "version_value": "5.9.1 with hotfix EPO5xHF1229850"}]}}]}, "vendor_name": "McAfee"}]}}, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "Application Protection Bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request."}]}, "impact": {"cvss": {"attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 4.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N", "version": "3.0"}}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "Application Protection Bypass vulnerability\n"}]}]}, "references": {"reference_data": [{"name": "104485", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104485"}, {"name": "https://kc.mcafee.com/corporate/index?page=content&id=SB10240", "refsource": "CONFIRM", "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10240"}, {"name": "46518", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/46518/"}, {"name": "1041155", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1041155"}]}, "source": {"advisory": "SB10240", "discovery": "INTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-05T06:10:11.361Z"}, "title": "CVE Program Container", "references": [{"name": "104485", "tags": ["vdb-entry", "x_refsource_BID", "x_transferred"], "url": "http://www.securityfocus.com/bid/104485"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://kc.mcafee.com/corporate/index?page=content&id=SB10240"}, {"name": "46518", "tags": ["exploit", "x_refsource_EXPLOIT-DB", "x_transferred"], "url": "https://www.exploit-db.com/exploits/46518/"}, {"name": "1041155", "tags": ["vdb-entry", "x_refsource_SECTRACK", "x_transferred"], "url": "http://www.securitytracker.com/id/1041155"}]}]}, "cveMetadata": {"assignerOrgId": "01626437-bf8f-4d1c-912a-893b5eb04808", "assignerShortName": "trellix", "cveId": "CVE-2018-6671", "datePublished": "2018-06-15T14:00:00", "dateReserved": "2018-02-06T00:00:00", "dateUpdated": "2024-08-05T06:10:11.361Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}