CVE-2016-8021

MEDIUM

Intel Security VirusScan Enterprise Linux <2.0.3 - RCE

Title source: llm
STIX 2.1

Description

Improper verification of cryptographic signature vulnerability in Intel Security VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier) allows remote authenticated users to spoof update server and execute arbitrary code via a crafted input file.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Andrew Fasano · pythonremotelinux
https://www.exploit-db.com/exploits/40911

References (4)

Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/94823
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://www.securitytracker.com/id/1037433
Exploit, Third Party Advisory exploit x_refsource_exploit-db
https://www.exploit-db.com/exploits/40911/

Scores

CVSS v3 5.0
EPSS 0.0285
EPSS Percentile 86.3%
Attack Vector LOCAL
CVSS:3.0/AV:L/AC:L/PR:L/UI:R/S:U/C:N/I:H/A:N

Details

CWE
CWE-347
Status published
Products (2)
Intel/VirusScan Enterprise Linux (VSEL) 2.0.3 (and earlier)
mcafee/virusscan_enterprise < 2.0.3
Published Mar 14, 2017
Tracked Since Feb 18, 2026