{"api_version":"1","generated_at":"2026-05-03T08:10:25+00:00","cve":"CVE-2018-6671","urls":{"html":"https://cve.report/CVE-2018-6671","api":"https://cve.report/api/cve/CVE-2018-6671.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2018-6671","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2018-6671"},"summary":{"title":"CVE-2018-6671","description":"Application Protection Bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request.","state":"PUBLIC","assigner":"psirt@mcafee.com","published_at":"2018-06-15 14:29:00","updated_at":"2023-11-07 03:00:00"},"problem_types":["NVD-CWE-noinfo"],"metrics":[],"references":[{"url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10240","name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10240","refsource":"CONFIRM","tags":["Vendor Advisory"],"title":"McAfee Security Bulletin - ePolicy Orchestrator update fixes possible localhost only access bypass and sensitive information leak vulnerability (CVE-2018-6671 and CVE-2018-6672)","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.exploit-db.com/exploits/46518/","name":"46518","refsource":"","tags":[],"title":"McAfee ePO 5.9.1 - Registered Executable Local Access Bypass - Windows webapps Exploit","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id/1041155","name":"1041155","refsource":"SECTRACK","tags":["Third Party Advisory","VDB Entry"],"title":"McAfee ePolicy Orchestrator Bugs Let Remote Authenticate Users Obtain Potentially Sensitive Information and Bypass Access Controls - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/104485","name":"104485","refsource":"","tags":[],"title":"Malformed Request","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://www.cve.org/CVERecord?id=CVE-2018-6671","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2018-6671","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2018","cve_id":"6671","vulnerable":"1","versionEndIncluding":"5.3.3","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"epolicy_orchestrator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2018","cve_id":"6671","vulnerable":"1","versionEndIncluding":"5.9.1","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"mcafee","cpe5":"epolicy_orchestrator","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[{"cve":"CVE-2018-6671","qid":"376557","title":"McAfee ePolicy Orchestrator Access Bypass and Aensitive Information Leak Vulnerabilities (SB10240)"}]},"source_records":{"cve_program":{"CVE_data_meta":{"ASSIGNER":"psirt@mcafee.com","ID":"CVE-2018-6671","STATE":"PUBLIC","TITLE":"SB10240 - ePolicy Orchestrator (ePO) - Application Protection Bypass vulnerability"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"ePolicy Orchestrator (ePO)","version":{"version_data":[{"affected":"<","version_name":"5.3.0 through 5.3.3","version_value":"5.3.3 with hotfix EPO5xHF1229850"},{"affected":"<","version_name":"5.9.0 through 5.9.1","version_value":"5.9.1 with hotfix EPO5xHF1229850"}]}}]},"vendor_name":"McAfee"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Application Protection Bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request."}]},"impact":{"cvss":{"attackComplexity":"HIGH","attackVector":"NETWORK","availabilityImpact":"NONE","baseScore":4.7,"baseSeverity":"MEDIUM","confidentialityImpact":"LOW","integrityImpact":"LOW","privilegesRequired":"NONE","scope":"CHANGED","userInteraction":"REQUIRED","vectorString":"CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:C/C:L/I:L/A:N","version":"3.0"}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"Application Protection Bypass vulnerability\n"}]}]},"references":{"reference_data":[{"name":"104485","refsource":"BID","url":"http://www.securityfocus.com/bid/104485"},{"name":"https://kc.mcafee.com/corporate/index?page=content&id=SB10240","refsource":"CONFIRM","url":"https://kc.mcafee.com/corporate/index?page=content&id=SB10240"},{"name":"46518","refsource":"EXPLOIT-DB","url":"https://www.exploit-db.com/exploits/46518/"},{"name":"1041155","refsource":"SECTRACK","url":"http://www.securitytracker.com/id/1041155"}]},"source":{"advisory":"SB10240","discovery":"INTERNAL"}},"nvd":{"publishedDate":"2018-06-15 14:29:00","lastModifiedDate":"2023-11-07 03:00:00","problem_types":["NVD-CWE-noinfo"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.0","vectorString":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"NONE","baseScore":6.5,"baseSeverity":"MEDIUM"},"exploitabilityScore":2.8,"impactScore":3.6},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:N/I:P/A:N","accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"NONE","integrityImpact":"PARTIAL","availabilityImpact":"NONE","baseScore":4},"severity":"MEDIUM","exploitabilityScore":8,"impactScore":2.9,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"5.3.0","versionEndIncluding":"5.3.3","cpe_name":[]},{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*","versionStartIncluding":"5.9.0","versionEndIncluding":"5.9.1","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2018","CveId":"6671","Ordinal":"122880","Title":"CVE-2018-6671","CVE":"CVE-2018-6671","Year":"2018"},"notes":[{"CveYear":"2018","CveId":"6671","Ordinal":"1","NoteData":"Application Protection Bypass vulnerability in McAfee ePolicy Orchestrator (ePO) 5.3.0 through 5.3.3 and 5.9.0 through 5.9.1 allows remote authenticated users to bypass localhost only access security protection for some ePO features via a specially crafted HTTP request.","Type":"Description","Title":null},{"CveYear":"2018","CveId":"6671","Ordinal":"2","NoteData":"2018-06-15","Type":"Other","Title":"Published"},{"CveYear":"2018","CveId":"6671","Ordinal":"3","NoteData":"2019-03-09","Type":"Other","Title":"Modified"}]}}}