{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-21T16:09:09.198","vulnerabilities":[{"cve":{"id":"CVE-2019-3648","sourceIdentifier":"trellixpsirt@trellix.com","published":"2019-11-13T09:15:10.877","lastModified":"2024-11-21T04:42:17.537","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A Privilege Escalation vulnerability in the Microsoft Windows client in McAfee Total Protection 16.0.R22 and earlier allows administrators to execute arbitrary code via carefully placing malicious files in specific locations protected by administrator permission."},{"lang":"es","value":"Una vulnerabilidad de escalada de privilegios en el cliente de Microsoft Windows en McAfee Total Protection versión 16.0.R22 y anteriores, permite a administradores ejecutar código arbitrario mediante la colocación cuidadosa de archivos maliciosos dentro de ubicaciones específicas protegidas mediante permiso de administrador."}],"metrics":{"cvssMetricV31":[{"source":"trellixpsirt@trellix.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:H/PR:H/UI:N/S:C/C:N/I:H/A:L","baseScore":6.1,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"HIGH","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"LOW"},"exploitabilityScore":0.8,"impactScore":4.7},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H","baseScore":6.7,"baseSeverity":"MEDIUM","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"HIGH","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":0.8,"impactScore":5.9}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","baseScore":7.2,"accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":3.9,"impactScore":10.0,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"weaknesses":[{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-426"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:anti-virus_plus:*:*:*:*:*:*:*:*","versionEndIncluding":"16.0.r22","matchCriteriaId":"10E5C397-E68B-4511-85C0-B3252F5601AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:internet_security:*:*:*:*:*:*:*:*","versionEndIncluding":"16.0.r22","matchCriteriaId":"0229CEC5-62A2-4A9D-B04A-1533F253CDCA"},{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:total_protection:*:*:*:*:*:*:*:*","versionEndIncluding":"16.0r22","matchCriteriaId":"F541EBA4-75A9-48C2-9E58-2AE1F90AEC23"}]}]}],"references":[{"url":"https://safebreach.com/Post/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648","source":"trellixpsirt@trellix.com"},{"url":"https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102984","source":"trellixpsirt@trellix.com"},{"url":"https://safebreach.com/Post/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648","source":"af854a3a-2127-422b-91ae-364da2661108"},{"url":"https://service.mcafee.com/webcenter/portal/cp/home/articleview?articleId=TS102984","source":"af854a3a-2127-422b-91ae-364da2661108"}]}}]}