#VU22745 Permissions, Privileges, and Access Controls in McAfee products - CVE-2019-3648


Vulnerability identifier: #VU22745

Vulnerability risk: High

CVSSv4.0: 4.8 [CVSS:4.0/AV:N/AC:L/AT:P/PR:H/UI:N/VC:H/VI:H/VA:H/SC:N/SI:N/SA:N/E:U/U:Amber]

CVE-ID: CVE-2019-3648

CWE-ID: CWE-264

Exploitation vector: Network

Exploit availability: No

Vulnerable software:
McAfee Total Protection (MTP)
Client/Desktop applications / Antivirus software/Personal firewalls
McAfee Anti-Virus Plus (AVP)
Client/Desktop applications / Antivirus software/Personal firewalls
McAfee Internet Security (MIS)
Client/Desktop applications / Antivirus software/Personal firewalls

Vendor: McAfee

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to the affected software does not check if the third-party files have the correct digital signatures and are loaded from the correct location. A remote administrator can load an unsigned arbitrary DLL, execute arbitrary code on the target system and escalate to SYSTEM privileges.

Mitigation
Install updates from vendor's website.

Vulnerable software versions

McAfee Total Protection (MTP): 16.0.R22

McAfee Anti-Virus Plus (AVP): 16.0.R22

McAfee Internet Security (MIS): 16.0.R22


External links
https://gbhackers.com/vulnerability-mcafee-antivirus/
https://service.mcafee.com/webcenter/portal/oracle/webcenter/page/scopedMD/s55728c97_466d_4ddb_952d_05484ea932c6/Page29.jspx?wc.contextURL=%2Fspaces%2Fcp&articleId=TS102984&_afrLoop=518789560755102&leftWidth=0%25&showFooter=false&showHeader=false&rightWidth=0%25¢erWidth=100%25#!%40%40%3FshowFooter%3Dfalse%26_afrLoop%3D518789560755102%26articleId%3DTS102984%26leftWidth%3D0%2525%26showHeader%3Dfalse%26wc.contextURL%3D%252Fspaces%252Fcp%26rightWidth%3D0%2525%26centerWidth%3D100%2525%26_adf.ctrl-state%3D17dpx1xd3k_75


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.


Latest bulletins with this vulnerability