First published: Tue Mar 14 2017(Updated: )
Privilege escalation vulnerability in Intel Security McAfee Application Control (MAC) 7.0 and 6.x versions allows attackers to cause DoS, unexpected behavior, or potentially unauthorized code execution via an unauthorized use of IOCTL call.
Credit: secure@intel.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Application Control | =6.0.0 | |
McAfee Application Control | =6.1.0 | |
McAfee Application Control | =6.1.1 | |
McAfee Application Control | =6.1.2 | |
McAfee Application Control | =6.1.3 | |
McAfee Application Control | =6.2.0 | |
McAfee Application Control | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-8009 is identified as a high-severity vulnerability due to its potential for privilege escalation.
To mitigate CVE-2016-8009, upgrade to the latest version of McAfee Application Control that addresses this vulnerability.
CVE-2016-8009 affects McAfee Application Control versions 6.0.0 through 7.0.0.
CVE-2016-8009 can enable attackers to perform a denial of service, cause unexpected behavior, or execute unauthorized code.
Organizations using vulnerable versions of McAfee Application Control are at risk of exploitation from CVE-2016-8009.