Vulnerabilities > CVE-2019-3621 - Unspecified vulnerability in Mcafee Data Loss Prevention Endpoint
Attack vector
PHYSICAL Attack complexity
LOW Privileges required
HIGH Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
Authentication protection bypass vulnerability in McAfee Data Loss Prevention (DLPe) for Windows 11.x prior to 11.3.0 allows physical local user to bypass the Windows lock screen via DLPe processes being killed just prior to the screen being locked or when the screen is locked. The attacker requires physical access to the machine.
Vulnerable Configurations
Nessus
NASL family | Windows |
NASL id | MCAFEE_DLPE_SB10290.NASL |
description | The version of the McAfee Data Loss Prevention Endpoint (DLPe) Agent installed on the remote Windows host is prior to 11.1.200 or 11.2.x. It is, therefore, affected by multiple vulnerabilities: - Stored XSS in the ePO extension UI. (CVE-2019-3591) - Authenticated command injection in the ePO extension. (CVE-2019-3595) - Physical access authentication bypass. (CVE-2019-3621) - Arbitrary log file redirect. (CVE-2019-3622) |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 127117 |
published | 2019-08-05 |
reporter | This script is Copyright (C) 2019 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/127117 |
title | McAfee DLPe Agent < 11.1.200 / 11.2.x Multiple Vulnerabilities (SB10289) (SB10290) |