ID CVE-2019-3586
Summary Protection Mechanism Failure in the Firewall in McAfee Endpoint Security (ENS) 10.x prior to 10.6.1 May 2019 update allows context-dependent attackers to circumvent ENS protection where GTI flagged IP addresses are not blocked by the ENS Firewall via specially crafted malicious sites where the GTI reputation is carefully manipulated and does not correctly trigger the ENS Firewall to block the connection.
References
Vulnerable Configurations
  • cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.0:*:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.1:-:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.1:-:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.1:hotfix1:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.1:hotfix1:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.1:hotfix2:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.1:hotfix2:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.2:-:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.2:-:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.2:hotfix1:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.2:hotfix1:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.2:hotfix2:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.2:hotfix2:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.3:*:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.3:*:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.4:*:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.4:*:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.5:*:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.6:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.6:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.7:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.7:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.8:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.8:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.9:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.9:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.5.10:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.5.10:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.6.0:*:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.6.1:*:*:*:*:macos:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.6.1:*:*:*:*:macos:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.6.1:*:*:*:*:windows:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.6.1:*:*:*:*:windows:*:*
  • cpe:2.3:a:mcafee:endpoint_security:10.6.1:201905:*:*:*:*:*:*
    cpe:2.3:a:mcafee:endpoint_security:10.6.1:201905:*:*:*:*:*:*
CVSS
Base: 5.1 (as of 16-10-2020 - 16:12)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK HIGH NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:H/Au:N/C:P/I:P/A:P
refmap via4
bid 108416
confirm https://kc.mcafee.com/corporate/index?page=content&id=SB10280
Last major update 16-10-2020 - 16:12
Published 15-05-2019 - 16:29
Last modified 16-10-2020 - 16:12
Back to Top