CVE-2021-23872

7.8 HIGH

📋 TL;DR

This CVE describes a local privilege escalation vulnerability in McAfee Total Protection's File Lock component. A local user can manipulate symbolic links through the IOCTL interface to gain elevated system privileges. Only users with local access to systems running vulnerable McAfee Total Protection versions are affected.

💻 Affected Systems

Products:
  • McAfee Total Protection (MTP)
Versions: All versions prior to 16.0.32
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems with McAfee Total Protection installed. Requires local access to the system.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/administrator privileges, enabling complete system compromise, data theft, malware persistence, and lateral movement.

🟠

Likely Case

Local user or malware with initial foothold escalates privileges to install additional malware, disable security controls, or access sensitive data.

🟢

If Mitigated

With proper patch management and least privilege principles, impact limited to isolated systems with no administrative access paths.

🌐 Internet-Facing: LOW - This is a local privilege escalation requiring local system access, not remotely exploitable.
🏢 Internal Only: HIGH - Local attackers or compromised accounts can exploit this to gain full system control on vulnerable endpoints.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local access and knowledge of symbolic link manipulation techniques. No public exploit code identified.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 16.0.32 or later

Vendor Advisory: http://service.mcafee.com/FAQDocument.aspx?&id=TS103146

Restart Required: Yes

Instructions:

1. Open McAfee Total Protection. 2. Navigate to Settings > General > Updates. 3. Click 'Check for Updates'. 4. Install all available updates. 5. Restart the computer when prompted.

🔧 Temporary Workarounds

Disable File Lock component

windows

Temporarily disable the vulnerable File Lock feature until patching is possible

Open McAfee console > Navigate to PC Security > File Lock > Turn Off

Restrict local user privileges

windows

Implement least privilege by removing local administrative rights from standard users

🧯 If You Can't Patch

  • Implement application whitelisting to prevent unauthorized process execution
  • Deploy endpoint detection and response (EDR) solutions to monitor for privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check McAfee Total Protection version in the application interface or via 'Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*McAfee Total Protection*'} | Select-Object Name, Version' in PowerShell

Check Version:

Get-WmiObject -Class Win32_Product | Where-Object {$_.Name -like '*McAfee Total Protection*'} | Select-Object Version

Verify Fix Applied:

Confirm version is 16.0.32 or higher using the same version check command

📡 Detection & Monitoring

Log Indicators:

  • Unusual process creation with SYSTEM privileges from non-admin users
  • File Lock component access patterns from non-trusted users
  • Symbolic link creation in protected directories

Network Indicators:

  • None - this is a local exploit

SIEM Query:

EventID=4688 AND NewProcessName LIKE '%cmd.exe%' OR '%powershell.exe%' AND SubjectUserName NOT IN (admin_users) AND TokenElevationType=%%1938

🔗 References

📤 Share & Export