CVE-2021-31854
Plain English Summary
AI-powered analysis for quick understanding
This vulnerability allows an attacker to run their own commands on a Windows system by tricking McAfee Agent into executing a malicious file. To exploit it, the attacker needs local access to the machine and must place a specially crafted file in the right folder, which can then lead to gaining higher privileges on the system.
Technical Description
A command Injection Vulnerability in McAfee Agent (MA) for Windows prior to 5.7.5 allows local users to inject arbitrary shell code into the file cleanup.exe. The malicious clean.exe file is placed into the relevant folder and executed by running the McAfee Agent deployment feature located in the System Tree. An attacker may exploit the vulnerability to obtain a reverse shell which can lead to privilege escalation to obtain root privileges.
CVSS Vector Analysis
Vector String
CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploit Resources
Search for proof-of-concept code and exploit modules
Official References
Quick Information
Published
Jan 19, 2022
about 4 years ago
Last Modified
Feb 24, 2026
about 1 month ago
Vendor
mcafee
Product
agent
Related Vulnerabilities
This vulnerability allows an attacker to access sensitive information from Acronis Cyber Protect products without proper authorization. It affects versions prior to specific builds, meaning that if your software isn't updated, an attacker could potentially view confidential data on your system.
This vulnerability allows an attacker to access sensitive information from Acronis Cyber Protect products due to a lack of proper authorization controls. It affects versions prior to specific builds, meaning that if your software is outdated, an attacker could exploit this flaw to retrieve confidential data without permission.
This vulnerability allows an attacker to access and manipulate sensitive information in Acronis Cyber Protect products due to a lack of proper authorization checks. It affects users running outdated versions of the software on Linux, macOS, or Windows, meaning that if your system isn't updated, it could be at risk.
This vulnerability allows an attacker with local access to a system to gain higher privileges than they should have, potentially letting them control the system or access sensitive data. It affects specific versions of Acronis Cyber Protect products before certain builds, meaning attackers need to be able to log into the system first to exploit it.
This vulnerability allows a local user to access sensitive files in McAfee Endpoint Security that they shouldn't normally be able to reach by tricking the software into redirecting its file operations. To exploit this, the attacker needs to manipulate junction links on the system, which requires some level of access to the local machine.