Description
Potential product security bypass vulnerability in McAfee Application and Change Control (MACC) prior to version 8.3.4 allows a locally logged in attacker to circumvent the application solidification protection provided by MACC, permitting them to run applications that would usually be prevented by MACC. This would require the attacker to rename the specified binary to match name of any configured updater and perform a specific set of steps, resulting in the renamed binary to be to run.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2021-18708 | Potential product security bypass vulnerability in McAfee Application and Change Control (MACC) prior to version 8.3.4 allows a locally logged in attacker to circumvent the application solidification protection provided by MACC, permitting them to run applications that would usually be prevented by MACC. This would require the attacker to rename the specified binary to match name of any configured updater and perform a specific set of steps, resulting in the renamed binary to be to run. |
References
History
No history.
Status: PUBLISHED
Assigner: trellix
Published:
Updated: 2024-08-03T23:10:30.836Z
Reserved: 2021-04-27T00:00:00.000Z
Link: CVE-2021-31833
No data.
Status : Modified
Published: 2022-01-04T10:15:07.977
Modified: 2024-11-21T06:06:19.177
Link: CVE-2021-31833
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD