Vulnerabilities > CVE-2019-3621 - Unspecified vulnerability in Mcafee Data Loss Prevention Endpoint

047910
CVSS 6.2 - MEDIUM
Attack vector
PHYSICAL
Attack complexity
LOW
Privileges required
HIGH
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
low complexity
mcafee
nessus

Summary

Authentication protection bypass vulnerability in McAfee Data Loss Prevention (DLPe) for Windows 11.x prior to 11.3.0 allows physical local user to bypass the Windows lock screen via DLPe processes being killed just prior to the screen being locked or when the screen is locked. The attacker requires physical access to the machine.

Nessus

NASL familyWindows
NASL idMCAFEE_DLPE_SB10290.NASL
descriptionThe version of the McAfee Data Loss Prevention Endpoint (DLPe) Agent installed on the remote Windows host is prior to 11.1.200 or 11.2.x. It is, therefore, affected by multiple vulnerabilities: - Stored XSS in the ePO extension UI. (CVE-2019-3591) - Authenticated command injection in the ePO extension. (CVE-2019-3595) - Physical access authentication bypass. (CVE-2019-3621) - Arbitrary log file redirect. (CVE-2019-3622)
last seen2020-06-01
modified2020-06-02
plugin id127117
published2019-08-05
reporterThis script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/127117
titleMcAfee DLPe Agent < 11.1.200 / 11.2.x Multiple Vulnerabilities (SB10289) (SB10290)