By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitrary code through insecure use of predictable temporary file locations.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 6.9
v3 : 8.2 |
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10355 - |
07 Nov 2023, 03:30
Type | Values Removed | Values Added |
---|---|---|
CWE | ||
References | () https://kc.mcafee.com/corporate/index?page=content&id=SB10355 - | |
Summary | By exploiting a time of check to time of use (TOCTOU) race condition during the Endpoint Security for Linux Threat Prevention and Firewall (ENSL TP/FW) installation process, a local user can perform a privilege escalation attack to obtain administrator privileges for the purpose of executing arbitrary code through insecure use of predictable temporary file locations. |
Information
Published : 2021-05-12 09:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-23892
Mitre link : CVE-2021-23892
CVE.ORG link : CVE-2021-23892
JSON object : View
Products Affected
mcafee
- endpoint_security_for_linux_threat_prevention