Learn about CVE-2018-6690, a medium severity vulnerability in McAfee Application Control (MAC) allowing authenticated users to execute arbitrary code on Microsoft Windows clients. Find out how to mitigate this issue.
A vulnerability in McAfee Application Control (MAC) allows authenticated users to execute arbitrary code on Microsoft Windows clients.
Understanding CVE-2018-6690
This CVE involves a whitelist bypass vulnerability in McAfee Application Control (MAC) that enables the execution of arbitrary code.
What is CVE-2018-6690?
The vulnerability in McAfee Application and Change Control (MACC) 8.0.0 Hotfix 4 and earlier versions allows authenticated users to run arbitrary code by accessing, modifying, or executing executable files through file transfer from an external system.
The Impact of CVE-2018-6690
The vulnerability has a CVSS base score of 6.1, indicating a medium severity issue. It poses a high integrity impact and low confidentiality impact.
Technical Details of CVE-2018-6690
This section provides detailed technical information about the CVE.
Vulnerability Description
The vulnerability in McAfee Application Control (MAC) allows authenticated users to execute arbitrary code on Microsoft Windows clients by bypassing whitelists.
Affected Systems and Versions
Exploitation Mechanism
The vulnerability can be exploited by authenticated users to run arbitrary code through file transfer from an external system.
Mitigation and Prevention
Protect your systems from CVE-2018-6690 with the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that you regularly update McAfee Application Control (MAC) to the latest version to mitigate the vulnerability.