CVE-2020-7346

7.8 HIGH

📋 TL;DR

A local privilege escalation vulnerability in McAfee Data Loss Prevention (DLP) for Windows allows low-privileged attackers to load arbitrary DLLs via junction manipulation and specific IOTL commands. This enables attackers to execute code with higher privileges on affected systems. Only Windows systems running vulnerable McAfee DLP versions are affected.

💻 Affected Systems

Products:
  • McAfee Data Loss Prevention (DLP) for Windows
Versions: All versions prior to 11.6.100
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires Windows OS with McAfee DLP installed. Attack requires local access and ability to create/remove junctions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise with SYSTEM/administrator privileges, enabling persistent backdoors, credential theft, and lateral movement across the network.

🟠

Likely Case

Local privilege escalation to SYSTEM/administrator level, allowing installation of malware, disabling security controls, and accessing sensitive data.

🟢

If Mitigated

Limited impact with proper endpoint protection, least privilege enforcement, and network segmentation preventing lateral movement.

🌐 Internet-Facing: LOW - Requires local access to the system, not remotely exploitable.
🏢 Internal Only: HIGH - Local attackers or malware with initial foothold can escalate privileges on vulnerable endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access, junction manipulation, and precise timing of IOTL commands. Not trivial but feasible for determined attackers.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 11.6.100 or later

Vendor Advisory: https://kc.mcafee.com/corporate/index?page=content&id=SB10344

Restart Required: Yes

Instructions:

1. Download McAfee DLP 11.6.100 or later from official sources. 2. Run installer with administrative privileges. 3. Restart system as prompted. 4. Verify successful update through DLP console.

🔧 Temporary Workarounds

Restrict junction creation

windows

Prevent low-privileged users from creating NTFS junctions via Group Policy or registry settings

reg add "HKLM\SOFTWARE\Policies\Microsoft\Windows\Installer" /v "DisableBrowse" /t REG_DWORD /d 1 /f

Remove unnecessary local accounts

windows

Reduce attack surface by removing non-essential local user accounts

net user [username] /delete

🧯 If You Can't Patch

  • Implement strict least privilege - ensure no users have unnecessary local administrative rights
  • Deploy application control/whitelisting to prevent unauthorized DLL loading and execution

🔍 How to Verify

Check if Vulnerable:

Check McAfee DLP version in Control Panel > Programs and Features or via DLP management console

Check Version:

wmic product where "name like 'McAfee Data Loss Prevention%'" get version

Verify Fix Applied:

Confirm version is 11.6.100 or higher in DLP console or program properties

📡 Detection & Monitoring

Log Indicators:

  • Unusual junction creation/deletion events in Windows Security logs
  • Suspicious DLL loading by DLP processes
  • Failed privilege escalation attempts

Network Indicators:

  • Unusual outbound connections from DLP processes post-exploitation

SIEM Query:

EventID=4656 OR EventID=4663 AND ObjectType="File" AND ProcessName="*dlp*" AND AccessMask="0x100"

🔗 References

📤 Share & Export