First published: Tue Apr 03 2018(Updated: )
Maliciously misconfigured registry vulnerability in all Microsoft Windows products in McAfee consumer and corporate products allows an administrator to inject arbitrary code into a debugged McAfee process via manipulation of registry parameters.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Anti-virus Plus | ||
Mcafee Endpoint Security | =10.2 | |
Mcafee Host Intrusion Prevention | <=8.0 | |
Mcafee Host Intrusion Prevention | =8.0-patch_1 | |
Mcafee Host Intrusion Prevention | =8.0-patch_2 | |
Mcafee Host Intrusion Prevention | =8.0-patch_3 | |
Mcafee Host Intrusion Prevention | =8.0-patch_4 | |
Mcafee Host Intrusion Prevention | =8.0-patch_5 | |
Mcafee Host Intrusion Prevention | =8.0-patch_6 | |
Mcafee Host Intrusion Prevention | =8.0-patch_7 | |
Mcafee Host Intrusion Prevention | =8.0-patch_8 | |
Mcafee Host Intrusion Prevention | =8.0-patch_9 | |
Mcafee Internet Security | ||
Mcafee Total Protection | ||
Mcafee Virus Scan Enterprise | <=8.8 | |
Mcafee Virus Scan Enterprise | =8.8-patch_9 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2017-4028 is medium with a CVSS score of 4.4.
The affected products include McAfee Anti-virus Plus, McAfee Endpoint Security 10.2, McAfee Host Intrusion Prevention 8.0 (up to patch 9), McAfee Internet Security, McAfee Total Protection, and McAfee Virus Scan Enterprise 8.8 (up to patch 9).
An administrator can exploit CVE-2017-4028 by injecting arbitrary code into a debugged McAfee process through manipulation of registry parameters.
No, Microsoft Windows products are not vulnerable to CVE-2017-4028.
You can find more information about CVE-2017-4028 at the following links: [SecurityFocus](http://www.securityfocus.com/bid/97958), [McAfee Knowledge Center](https://kc.mcafee.com/corporate/index?page=content&id=SB10193).