First published: Wed May 12 2021(Updated: )
By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitrary code through insecure use of predictable temporary file locations.
Credit: psirt@mcafee.com
Affected Software | Affected Version | How to fix |
---|---|---|
McAfee Endpoint Security for Linux Threat Prevention | >=10.5.0<10.7.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-23892 has a high severity rating due to its potential for privilege escalation.
To fix CVE-2021-23892, update McAfee Endpoint Security for Linux Threat Prevention to a version higher than 10.7.5.
CVE-2021-23892 affects local users of McAfee Endpoint Security for Linux Threat Prevention versions from 10.5.0 to 10.7.5.
CVE-2021-23892 is a time of check to time of use (TOCTOU) race condition vulnerability.
No, CVE-2021-23892 requires local access for exploitation.