CVE-2021-31833
CVSS V2 Medium 4.6
CVSS V3 High 7.8
Description
Potential product security bypass vulnerability in McAfee Application and Change Control (MACC) prior to version 8.3.4 allows a locally logged in attacker to circumvent the application solidification protection provided by MACC, permitting them to run applications that would usually be prevented by MACC. This would require the attacker to rename the specified binary to match name of any configured updater and perform a specific set of steps, resulting in the renamed binary to be to run.
Overview
- CVE ID
- CVE-2021-31833
- Assigner
- psirt@mcafee.com
- Vulnerability Status
- Analyzed
- Published Version
- 2022-01-04T10:15:07
- Last Modified Date
- 2022-01-12T21:27:32
Weakness Enumerations
CPE Configuration (Product)
CPE | Vulnerable | Operator | Version Start | Version End |
---|---|---|---|---|
cpe:2.3:a:mcafee:application_and_change_control:*:*:*:*:*:*:*:* | 1 | OR | 8.3.4 |
CVSS Version 2
- Version
- 2.0
- Vector String
- AV:L/AC:L/Au:N/C:P/I:P/A:P
- Access Vector
- LOCAL
- Access Compatibility
- LOW
- Authentication
- NONE
- Confidentiality Impact
- PARTIAL
- Integrity Impact
- PARTIAL
- Availability Impact
- PARTIAL
- Base Score
- 4.6
- Severity
- MEDIUM
- Exploitability Score
- 3.9
- Impact Score
- 6.4
CVSS Version 3
- Version
- 3.1
- Vector String
- CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
- Attack Vector
- LOCAL
- Attack Compatibility
- LOW
- Privileges Required
- LOW
- User Interaction
- NONE
- Scope
- UNCHANGED
- Confidentiality Impact
- HIGH
- Availability Impact
- HIGH
- Base Score
- 7.8
- Base Severity
- HIGH
- Exploitability Score
- 1.8
- Impact Score
- 5.9
References
Reference URL | Reference Tags |
---|---|
https://kc.mcafee.com/corporate/index?page=content&id=SB10370 | Vendor Advisory |
Sources
Source Name | Source URL |
---|---|
NIST | https://nvd.nist.gov/vuln/detail/CVE-2021-31833 |
MITRE | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31833 |
History
Created | Old Value | New Value | Data Type | Notes |
---|---|---|---|---|
2022-05-10 06:37:38 | Added to TrackCVE | |||
2022-12-06 05:39:10 | 2022-01-04T10:15Z | 2022-01-04T10:15:07 | CVE Published Date | updated |
2022-12-06 05:39:10 | 2022-01-12T21:27:32 | CVE Modified Date | updated | |
2022-12-06 05:39:11 | Analyzed | Vulnerability Status | updated |