Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2018-6660 : What You Need to Know

Learn about CVE-2018-6660 affecting McAfee ePolicy Orchestrator (ePO) versions 5.3.2, 5.3.1, 5.3.0, and 5.9.0. Understand the impact, technical details, and mitigation steps for this Directory Traversal vulnerability.

McAfee ePolicy Orchestrator (ePO) versions 5.3.2, 5.3.1, 5.3.0, and 5.9.0 are affected by a Directory Traversal vulnerability that allows administrators to exploit Windows alternate data streams, bypassing file extensions due to inadequate path validation when exporting a specific XML file.

Understanding CVE-2018-6660

This CVE involves a security vulnerability in McAfee ePolicy Orchestrator (ePO) versions 5.3.2, 5.3.1, 5.3.0, and 5.9.0.

What is CVE-2018-6660?

The vulnerability in ePO versions allows for Directory Traversal, enabling the circumvention of file extensions by exploiting Windows alternate data streams.

The Impact of CVE-2018-6660

The vulnerability has a CVSS base score of 6.2 (Medium severity) with high availability impact and requires high privileges for exploitation.

Technical Details of CVE-2018-6660

This section covers specific technical aspects of the CVE.

Vulnerability Description

The vulnerability in ePO versions 5.3.2, 5.3.1, 5.3.0, and 5.9.0 is due to insufficient path validation when exporting a particular XML file, leading to Directory Traversal.

Affected Systems and Versions

        Product: ePolicy Orchestrator (ePO)
        Vendor: McAfee
        Affected Versions: 5.3.2, 5.3.1, 5.3.0, 5.9.0

Exploitation Mechanism

        Attack Complexity: High
        Attack Vector: Network
        Privileges Required: High
        User Interaction: Required
        Scope: Changed
        Integrity Impact: Low
        Confidentiality Impact: None
        Availability Impact: High

Mitigation and Prevention

Protecting systems from the CVE and preventing exploitation.

Immediate Steps to Take

        Apply vendor-supplied patches or updates promptly.
        Monitor security advisories for any new information.
        Restrict network access to vulnerable systems.

Long-Term Security Practices

        Regularly update and patch software to address vulnerabilities.
        Implement strong access controls and least privilege principles.
        Conduct security assessments and penetration testing.

Patching and Updates

        McAfee may release patches or updates to address the Directory Traversal vulnerability in affected ePO versions.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now