CVE-2024-34405

9.1 CRITICAL

📋 TL;DR

This vulnerability allows attackers to launch arbitrary URLs within McAfee Security: Antivirus VPN for Android by exploiting improper deep link validation. It affects Android users running McAfee Security: Antivirus VPN versions before 8.3.0, potentially enabling malicious activities within the app's context.

💻 Affected Systems

Products:
  • McAfee Security: Antivirus VPN for Android
Versions: Versions before 8.3.0
Operating Systems: Android
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects the Android mobile application, not desktop or iOS versions.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could redirect users to malicious websites, execute phishing attacks, or potentially chain with other vulnerabilities to achieve remote code execution within the app's sandbox.

🟠

Likely Case

Attackers could redirect users to phishing sites, malicious downloads, or unwanted content while appearing to be within the legitimate McAfee app, increasing the success rate of social engineering attacks.

🟢

If Mitigated

With proper URL validation and sandboxing, the impact would be limited to opening unwanted URLs within the app's restricted context without broader system compromise.

🌐 Internet-Facing: HIGH
🏢 Internal Only: LOW

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Exploitation requires user interaction (clicking a malicious link) but no authentication. The vulnerability is in deep link handling, making it relatively straightforward to exploit.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 8.3.0 and later

Vendor Advisory: https://www.mcafee.com/support/?page=shell&shell=article-view&articleId=000002403

Restart Required: Yes

Instructions:

1. Open Google Play Store 2. Search for 'McAfee Security: Antivirus VPN' 3. Tap Update to version 8.3.0 or later 4. Restart the application after update completes

🔧 Temporary Workarounds

Disable deep link handling temporarily

android

Remove the app's ability to handle deep links until patched

1. Go to Android Settings > Apps > McAfee Security: Antivirus VPN > Open by default > Clear defaults
2. Disable 'Open supported links' option if available

🧯 If You Can't Patch

  • Uninstall the vulnerable application and use alternative security software
  • Educate users to avoid clicking unknown links and enable additional phishing protections

🔍 How to Verify

Check if Vulnerable:

Check app version in Google Play Store or app settings. If version is below 8.3.0, the device is vulnerable.

Check Version:

On Android device: Settings > Apps > McAfee Security: Antivirus VPN > App info > Version

Verify Fix Applied:

Confirm app version is 8.3.0 or higher in app settings or Google Play Store.

📡 Detection & Monitoring

Log Indicators:

  • Unusual deep link intents to McAfee app
  • Multiple URL launch attempts from external sources

Network Indicators:

  • Unexpected redirects from McAfee app to external domains
  • Traffic to known malicious domains originating from app

SIEM Query:

source="android_device" AND app="com.wsandroid.suite" AND (event="intent_received" OR event="url_launch") AND url CONTAINS "http"

🔗 References

📤 Share & Export