First published: Thu Apr 15 2021(Updated: )
Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) Endpoint for Windows prior to 11.6.100 allows a local, low privileged, attacker to write to arbitrary controlled kernel addresses. This is achieved by launching applications, suspending them, modifying the memory and restarting them when they are monitored by McAfee DLP through the hdlphook driver.
Credit: trellixpsirt@trellix.com psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Data Loss Prevention Endpoint | <11.6.100.41 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-23887 is high with a CVSS score of 7.8.
The affected software for CVE-2021-23887 is McAfee Data Loss Prevention (DLP) Endpoint for Windows prior to version 11.6.100.41.
The vulnerability in CVE-2021-23887 allows a local, low privileged attacker to write to arbitrary controlled kernel addresses by launching applications, suspending them, modifying the memory, and restarting.
Yes, a fix for CVE-2021-23887 is available in McAfee Data Loss Prevention (DLP) Endpoint version 11.6.100.41 and above.
More information about CVE-2021-23887 can be found on the official McAfee website at the following links: [McAfee Security Bulletin SB10354](https://kc.mcafee.com/corporate/index?page=content&id=SB10354) and [McAfee Security Bulletin SB10357](https://kc.mcafee.com/corporate/index?page=content&id=SB10357).