First published: Wed Sep 22 2021(Updated: )
Improper access control vulnerability in the repair process for McAfee Agent for Windows prior to 5.7.4 could allow a local attacker to perform a DLL preloading attack using unsigned DLLs. This would result in elevation of privileges and the ability to execute arbitrary code as the system user, through not correctly protecting a temporary directory used in the repair process and not checking the DLL signature.
Credit: psirt@mcafee.com trellixpsirt@trellix.com
Affected Software | Affected Version | How to fix |
---|---|---|
Mcafee Mcafee Agent | <5.7.4 | |
Mcafee Endpoint Security | ||
Mcafee Agent | <5.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-31847 is high with a severity value of 7.8.
An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit CVE-2021-31847.
McAfee Endpoint Security versions up to and excluding 5.7.4 are affected by CVE-2021-31847.
Update McAfee Endpoint Security to a version higher than 5.7.4 to fix CVE-2021-31847.
You can find more information about CVE-2021-31847 in the following references: [McAfee Knowledge Center](https://kc.mcafee.com/corporate/index?page=content&id=SB10369) and [Zero Day Initiative Advisories](https://www.zerodayinitiative.com/advisories/ZDI-21-1104/).