{"id":11852,"date":"2019-11-13T00:10:00","date_gmt":"2019-11-12T23:10:00","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=11852"},"modified":"2023-08-25T22:54:37","modified_gmt":"2023-08-25T20:54:37","slug":"mcafee-patcht-schwachstelle-in-antivirus-produkten","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2019\/11\/13\/mcafee-patcht-schwachstelle-in-antivirus-produkten\/","title":{"rendered":"McAfee patches vulnerability in antivirus products"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/?p=224761\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]McAfee had to patch a Local Privlege Escalation (LPE) vulnerability in all editions of its antivirus software for Windows, allowing potential attackers to gain SYSTEM privileges.<\/p>\n<p><!--more--><\/p>\n<p>Affected by the Local Privlege Escalation bug are McAfee Total Protection (MTP), McAfee Anti-Virus Plus (AVP), and McAfee Internet Security (MIS) up to and including version 16.0.R22.<\/p>\n<h2>CVE-2019-3648: DLL-Hijacking<\/h2>\n<p>According to <a href=\"https:\/\/web.archive.org\/web\/20201207063712\/https:\/\/safebreach.com\/Post\/McAfee-All-Editions-MTP-AVP-MIS-Self-Defense-Bypass-and-Potential-Usages-CVE-2019-3648\" target=\"_blank\" rel=\"noopener noreferrer\">SafeBreach Labs security researcher Peleg Hadar<\/a>, who discovered the vulnerability, the LPE bug <a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-3648\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2019-3648<\/a> however requires that attackers have administrator rights to exploit it. Only then the DLLs can be stored in the appropriate directories. Many users will dismiss this as unproblematic. But the vulnerability allows attackers to bypass McAfee's self defense mechanism by loading any unsigned DLL into multiple services running as NT AUTHORITY\\SYSTEM. <\/p>\n<p>The problem is once again DLL hijacking, where the DLL search order is used to load DLLs on an already infiltrated machine through system services and thus obtain their permissions. In the concrete case, during the investigation of the products, it was noticed that several McAfee services running as signed processes and as NT AUTHORITY\\SYSTEM try to load: <\/p>\n<p>c:\\Windows\\System32\\wbem\\wbemcomn.dll <\/p>\n<p>This file can't be found because it is located in <em>System32<\/em> and not in the <em>System32\\Wbem<\/em> folder. The following graphic shows the futile attempts to load the DLL.<\/p>\n<p><a href=\"https:\/\/web.archive.org\/web\/20201209134733\/https:\/\/safebreach.com\/get\/files\/image\/galleries\/safe2-0001.png\" target=\"_blank\" rel=\"noopener noreferrer\"><img loading=\"lazy\" decoding=\"async\" title=\"wbemcomn.dll \" alt=\"wbemcomn.dll \" src=\"https:\/\/web.archive.org\/web\/20201209134733\/https:\/\/safebreach.com\/get\/files\/image\/galleries\/safe2-0001.png\" width=\"638\" height=\"76\"><\/a><\/p>\n<p>The security researchers suspected that this error could be exploited to load any unsigned DLL into these processes. This enables McAfee's protection mechanisms to be bypassed and at the same time the DLL NT AUTHORITY\\SYSTEM permissions to be obtained.&nbsp; <\/p>\n<h2>A proof of concept<\/h2>\n<p>As part of a Proof of Concept (PoC), the security researchers have compiled an unsigned proxy DLL that calls the original <em>wbemcomn.dll<\/em> features. This DLL should also write the name of the loading process, the username that called the file, and the name of the DLL file into a txt file.<\/p>\n<p>The proxy DLL was then placed in <em>C:\\Windows\\System32\\Wbem<\/em> (which requires administrator privileges) and the computer restarted. Security researchers were able to load any DLL in this way and execute their own code in the context of multiple McAfee processes running NT AUTHORITY\\SYSTEM. This means that McAfee's protections have been bypassed. The vulnerability allows attackers to permanently load and execute malicious malicious code each time the services are loaded. Affected versions are:<\/p>\n<ul>\n<li>McAfee Total Protection (MTP)\n<li>McAfee Anti-Virus Plus (AVP)\n<li>McAfee Internet Security (MIS)<\/li>\n<\/ul>\n<p>up to and including 16.0.R22. McAfee has released version 16.0.R22 Refresh 1 to fix the problem.<\/p>\n<p>The vulnerability was reported to McAfee on August 5, 2019. On August 21, 2019, there was an initial response from HackerOne, and on September 3, 2019, McAfee confirmed the vulnerability. After several status updates, McAfee provided an update for the affected products on October 23, 2019. On October 31, 2019, McAfee assigned a CVE-2019-3648 for the vulnerability. On November 12, 2019, McAfee released a security advisory (but the link provided by the SafeBreach Labs security researcher does not work for me). So if you use McAfee, you should install an update immediately. (<a href=\"https:\/\/web.archive.org\/web\/20221005071613\/https:\/\/www.bleepingcomputer.com\/news\/security\/mcafee-patches-privilege-escalation-flaw-in-antivirus-software\/\" target=\"_blank\" rel=\"noopener noreferrer\">via<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]McAfee had to patch a Local Privlege Escalation (LPE) vulnerability in all editions of its antivirus software for Windows, allowing potential attackers to gain SYSTEM privileges.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580],"tags":[646,69],"class_list":["post-11852","post","type-post","status-publish","format-standard","hentry","category-security","tag-antivirus","tag-security"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/11852","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=11852"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/11852\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=11852"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=11852"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=11852"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}