Connect with us

Hi, what are you looking for?


Endpoint Security

Serious Vulnerabilities Found in McAfee Enterprise Product

Intel Security’s McAfee VirusScan Enterprise product for Linux is affected by ten vulnerabilities, including serious flaws that can be chained for remote code execution with root privileges.

Intel Security’s McAfee VirusScan Enterprise product for Linux is affected by ten vulnerabilities, including serious flaws that can be chained for remote code execution with root privileges.

Researcher Andrew Fasano reported the vulnerabilities to Intel Security via CERT/CC in June, but users were only informed about the availability of patches late last week.

Fasano identified a wide range of vulnerabilities, including information disclosure, special element injection, cross-site request forgery (CSRF), cross-site scripting (XSS), remote code execution, privilege escalation, authentication brute-force, SQL injection, and arbitrary file write issues.

Intel Security has classified four of the flaws as having high severity, while the rest have been rated medium severity. According to the researcher, four of the security holes can be chained to achieve remote code execution with root privileges.

The attack starts with a flaw that allows the remote use of authentication tokens (CVE-2016-8022) that have been brute-forced (CVE-2016-8023). The attacker then deploys a malicious update server and leverages CVE-2016-8022 to configure the product to use that server.

An arbitrary file write vulnerability (CVE-2016-8021) can then be exploited to create a malicious script obtained from the update server. This flaw can also be combined with a privilege escalation (CVE-2016-8020) that enables the attacker to obtain root permissions. It’s worth noting that the main scanner service in McAfee VirusScan Enterprise runs as root.

Finally, the attacker can execute the malicious script as root on the system. The researcher has published proof-of-concept (PoC) code for this exploit chain.

According to Intel Security, the vulnerabilities affect VirusScan Enterprise for Linux (VSEL) 2.0.3 and earlier. Since the VSEL product will soon reach end of life, the vendor has advised customers to upgrade to Endpoint Security for Linux (ENSL) 10.2 or later, which addresses the flaws. CERT/CC said existing customers can upgrade free of charge.

Advertisement. Scroll to continue reading.

CERT/CC has also informed users of a potential denial-of-service/remote code execution issue affecting McAfee VirusScan Enterprise for Windows. The flaw in the Windows version, identified by Shelby Kaba, appears to be unpatched.

Related: Intel to Spin Off McAfee as Independent Security Firm

Related: McAfee Prepares for Independence With Major Announcements

Related: Intel Announces EoL for McAfee Email Security Products

Written By

Eduard Kovacs (@EduardKovacs) is a managing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment


Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Join the session as we discuss the challenges and best practices for cybersecurity leaders managing cloud identities.


The AI Risk Summit brings together security and risk management executives, AI researchers, policy makers, software developers and influential business and government stakeholders.


People on the Move

Retired U.S. Army General and former NSA Director Paul M. Nakasone has joined the Board of Directors at OpenAI.

Jill Passalacqua has been appointed Chief Legal Officer at autonomous security solutions provider

Cisco has appointed Sean Duca as CISO and Practice Leader for the APJC region.

More People On The Move

Expert Insights