Learn about CVE-2018-6660 affecting McAfee ePolicy Orchestrator (ePO) versions 5.3.2, 5.3.1, 5.3.0, and 5.9.0. Understand the impact, technical details, and mitigation steps for this Directory Traversal vulnerability.
McAfee ePolicy Orchestrator (ePO) versions 5.3.2, 5.3.1, 5.3.0, and 5.9.0 are affected by a Directory Traversal vulnerability that allows administrators to exploit Windows alternate data streams, bypassing file extensions due to inadequate path validation when exporting a specific XML file.
Understanding CVE-2018-6660
This CVE involves a security vulnerability in McAfee ePolicy Orchestrator (ePO) versions 5.3.2, 5.3.1, 5.3.0, and 5.9.0.
What is CVE-2018-6660?
The vulnerability in ePO versions allows for Directory Traversal, enabling the circumvention of file extensions by exploiting Windows alternate data streams.
The Impact of CVE-2018-6660
The vulnerability has a CVSS base score of 6.2 (Medium severity) with high availability impact and requires high privileges for exploitation.
Technical Details of CVE-2018-6660
This section covers specific technical aspects of the CVE.
Vulnerability Description
The vulnerability in ePO versions 5.3.2, 5.3.1, 5.3.0, and 5.9.0 is due to insufficient path validation when exporting a particular XML file, leading to Directory Traversal.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
Protecting systems from the CVE and preventing exploitation.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates