CVE-2020-7264

8.8 HIGH

📋 TL;DR

A privilege escalation vulnerability in McAfee Endpoint Security for Windows allows local users to delete files they shouldn't have access to by manipulating symbolic links. This affects users running ENS for Windows versions prior to 10.7.0 Hotfix 199847.

💻 Affected Systems

Products:
  • McAfee Endpoint Security (ENS) for Windows
Versions: All versions prior to 10.7.0 Hotfix 199847
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local user access to the Windows system running vulnerable ENS version.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Malicious local user could delete critical system files, configuration files, or security logs, potentially causing system instability, data loss, or disabling security controls.

🟠

Likely Case

Local attacker with limited privileges could delete important user or application files, potentially disrupting operations or covering tracks of other malicious activities.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to files the user already has some access to, with detection of suspicious file deletion patterns.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local access to the machine.
🏢 Internal Only: HIGH - Internal users with local access to vulnerable systems can exploit this to escalate privileges and delete protected files.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and ability to run malicious script/program. Symbolic link manipulation requires understanding of file system operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.7.0 Hotfix 199847 or later

Vendor Advisory: https://kc.mcafee.com/corporate/index?page=content&id=SB10316

Restart Required: Yes

Instructions:

1. Download Hotfix 199847 from McAfee support portal. 2. Install the hotfix on affected systems. 3. Restart the system to complete installation.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Limit local user accounts to only necessary privileges to reduce attack surface.

Monitor symbolic link creation

windows

Implement monitoring for suspicious symbolic link creation and file deletion patterns.

🧯 If You Can't Patch

  • Implement strict least privilege access controls for local users
  • Enable detailed auditing of file deletion events and symbolic link operations

🔍 How to Verify

Check if Vulnerable:

Check ENS version in McAfee console or via 'Get-MpComputerStatus' PowerShell command and compare to vulnerable versions.

Check Version:

Get-MpComputerStatus | Select-Object AMProductVersion

Verify Fix Applied:

Verify ENS version is 10.7.0 Hotfix 199847 or later and check that hotfix installation completed successfully.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file deletions by McAfee processes
  • Suspicious symbolic link creation events
  • Failed file access attempts followed by successful deletions

Network Indicators:

  • None - this is a local file system attack

SIEM Query:

EventID=4663 AND ProcessName LIKE '%McAfee%' AND AccessMask='0x10000' (Delete access)

🔗 References

📤 Share & Export