McAfee VirusScan Enterprise 8.5.0.i Password Protection Remote Code Execution ⚔ [Disputed]
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.1 | $0-$5k | 0.00 |
Summary
A vulnerability classified as critical has been found in McAfee VirusScan Enterprise 8.5.0.i. The impacted element is an unknown function of the component Password Protection. This manipulation causes Remote Code Execution. This vulnerability appears as CVE-2007-1538. There is no available exploit. The real existence of this vulnerability is still doubted at the moment. It is advised to implement further authentication.
Details
A vulnerability classified as critical was found in McAfee VirusScan Enterprise 8.5.0.i (Anti-Malware Software). Affected by this vulnerability is some unknown processing of the component Password Protection. The manipulation with an unknown input leads to a remote code execution vulnerability. As an impact it is known to affect confidentiality, integrity, and availability. The summary by CVE is:
** DISPUTED ** McAfee VirusScan Enterprise 8.5.0.i uses insecure permissions for certain Windows Registry keys, which allows local users to bypass local password protection via the UIP value in (1) HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\DesktopProtection or (2) HKEY_LOCAL_MACHINE\SOFTWARE\Network Associates\TVD\VirusScan Entreprise\CurrentVersion. NOTE: this issue has been disputed by third-party researchers, stating that the default permissions for HKEY_LOCAL_MACHINE\SOFTWARE does not allow for write access and the product does not modify the inherited permissions. There might be an interaction error with another product.
The weakness was presented 03/17/2007 by thesinoda (Website). The advisory is shared at securitytracker.com. This vulnerability is known as CVE-2007-1538 since 03/20/2007. The exploitation appears to be easy. The attack can be launched remotely. The exploitation doesn't need any form of authentication. Neither technical details nor an exploit are publicly available.
The real existence of this vulnerability is still doubted at the moment.
It is possible to mitigate the problem by adding an authentication mechanism.
The vulnerability is also documented in the databases at OSVDB (33800†), SecurityTracker (ID 1017791†) and Vulnerability Center (SBV-17192†). Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.mcafee.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.3VulDB Meta Temp Score: 7.1
VulDB Base Score: 7.3
VulDB Temp Score: 7.1
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Remote Code ExecutionCWE: Unknown
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: AuthenticationStatus: 🔍
0-Day Time: 🔍
Timeline
03/17/2007 🔍03/19/2007 🔍
03/20/2007 🔍
03/20/2007 🔍
03/20/2007 🔍
03/31/2007 🔍
12/25/2007 🔍
03/13/2015 🔍
08/07/2024 🔍
Sources
Vendor: mcafee.comAdvisory: securitytracker.com⛔
Researcher: thesinoda
Status: Not defined
Disputed: 🔍
CVE: CVE-2007-1538 (🔍)
GCVE (CVE): GCVE-0-2007-1538
GCVE (VulDB): GCVE-100-35713
OSVDB: 33800 - McAfee VirusScan Enterprise Registry Permission Weakness UIP Local Password Bypass
SecurityTracker: 1017791
Vulnerability Center: 17192 - McAfee VirusScan Enterprise 8.5.0.i Insecure Permissions Allow Local Authentication Bypass, High
Entry
Created: 03/13/2015 12:16Updated: 08/07/2024 18:42
Changes: 03/13/2015 12:16 (56), 08/02/2019 09:25 (4), 08/07/2024 18:42 (17)
Complete: 🔍
Cache ID: 216::103
Several companies clearly confirm that VulDB is the primary source for best vulnerability data.
No comments yet. Languages: en.
Please log in to comment.