The McAfee VirusScan Console (mcconsol.exe) in McAfee Active Response (MAR) before 1.1.0.161, Agent (MA) 5.x before 5.0.2 Hotfix 1110392 (5.0.2.333), Data Exchange Layer 2.x (DXL) before 2.0.1.140.1, Data Loss Prevention Endpoint (DLPe) 9.3 before Patch 6 and 9.4 before Patch 1 HF3, Device Control (MDC) 9.3 before Patch 6 and 9.4 before Patch 1 HF3, Endpoint Security (ENS) 10.x before 10.1, Host Intrusion Prevention Service (IPS) 8.0 before 8.0.0.3624, and VirusScan Enterprise (VSE) 8.8 before P7 (8.8.0.1528) on Windows allows local administrators to bypass intended self-protection rules and disable the antivirus engine by modifying registry keys.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:51
Type | Values Removed | Values Added |
---|---|---|
References | () http://lab.mediaservice.net/advisory/2016-01-mcafee.txt - Exploit | |
References | () http://seclists.org/fulldisclosure/2016/Mar/13 - | |
References | () http://www.securitytracker.com/id/1035130 - | |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10151 - Vendor Advisory | |
References | () https://www.exploit-db.com/exploits/39531/ - Exploit |
Information
Published : 2016-04-08 15:59
Updated : 2024-11-21 02:51
NVD link : CVE-2016-3984
Mitre link : CVE-2016-3984
CVE.ORG link : CVE-2016-3984
JSON object : View
Products Affected
mcafee
- agent
- data_loss_prevention_endpoint
- data_exchange_layer
- active_response
- virusscan_enterprise
- host_intrusion_prevention
- endpoint_security
CWE
CWE-284
Improper Access Control