Potential product security bypass vulnerability in McAfee Application and Change Control (MACC) prior to version 8.3.4 allows a locally logged in attacker to circumvent the application solidification protection provided by MACC, permitting them to run applications that would usually be prevented by MACC. This would require the attacker to rename the specified binary to match name of any configured updater and perform a specific set of steps, resulting in the renamed binary to be to run.
Advisories
Source ID Title
EUVD EUVD EUVD-2021-18708 Potential product security bypass vulnerability in McAfee Application and Change Control (MACC) prior to version 8.3.4 allows a locally logged in attacker to circumvent the application solidification protection provided by MACC, permitting them to run applications that would usually be prevented by MACC. This would require the attacker to rename the specified binary to match name of any configured updater and perform a specific set of steps, resulting in the renamed binary to be to run.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: trellix

Published:

Updated: 2024-08-03T23:10:30.836Z

Reserved: 2021-04-27T00:00:00

Link: CVE-2021-31833

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2022-01-04T10:15:07.977

Modified: 2024-11-21T06:06:19.177

Link: CVE-2021-31833

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.