CVE-2022-1823

7.9 HIGH

📋 TL;DR

A local privilege escalation vulnerability in McAfee Consumer Product Removal Tool allows authenticated local users to modify configuration files and execute arbitrary code with elevated permissions. This affects users running versions prior to 10.4.128. Attackers can leverage this to perform living-off-the-land (LOLBin) attacks from a compromised user account.

💻 Affected Systems

Products:
  • McAfee Consumer Product Removal Tool
Versions: All versions prior to 10.4.128
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects systems where the removal tool is installed. Typically installed alongside McAfee consumer antivirus products.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Local attacker gains SYSTEM/root privileges, installs persistent malware, steals credentials, and pivots to other systems.

🟠

Likely Case

Malicious insider or compromised user account escalates privileges to install additional malware or maintain persistence.

🟢

If Mitigated

Attack limited to initial user context with proper file integrity monitoring and least privilege controls.

🌐 Internet-Facing: LOW - Requires local access, not remotely exploitable.
🏢 Internal Only: HIGH - Local privilege escalation allows attackers to move laterally from compromised workstations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: LIKELY
Unauthenticated Exploit: ✅ No
Complexity: LOW

Requires local user access. Exploitation involves simple file manipulation to trigger LOLBin execution.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.4.128 or later

Vendor Advisory: https://service.mcafee.com/?articleId=TS103318&page=shell&shell=article-view

Restart Required: No

Instructions:

1. Download latest McAfee Consumer Product Removal Tool from official McAfee site. 2. Run the updated removal tool. 3. Verify version is 10.4.128 or higher.

🔧 Temporary Workarounds

Remove vulnerable tool

windows

Uninstall McAfee Consumer Product Removal Tool if not needed

Control Panel > Programs > Uninstall a program > Select McAfee Consumer Product Removal Tool > Uninstall

Restrict configuration file permissions

windows

Set restrictive ACLs on configuration files to prevent modification

icacls "C:\Program Files\McAfee\MCPR\config.xml" /deny Users:(W)

🧯 If You Can't Patch

  • Implement strict file integrity monitoring on McAfee removal tool directories
  • Apply least privilege principles - ensure users don't have write access to program directories

🔍 How to Verify

Check if Vulnerable:

Check if McAfee Consumer Product Removal Tool is installed and version is below 10.4.128

Check Version:

Check registry: HKEY_LOCAL_MACHINE\SOFTWARE\McAfee\MCPR\Version or check program files directory

Verify Fix Applied:

Confirm version is 10.4.128 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Unexpected modifications to McAfee MCPR configuration files
  • Suspicious child processes spawned from MCPR tool

Network Indicators:

  • Unusual outbound connections from systems running vulnerable MCPR version

SIEM Query:

Process creation where parent process contains 'mcpr' AND (command line contains unusual parameters OR child process is suspicious)

🔗 References

📤 Share & Export