Privilege Escalation via Arbitrary Kernel Address Write in McAfee DLP Endpoint for Windows

Privilege Escalation via Arbitrary Kernel Address Write in McAfee DLP Endpoint for Windows

CVE-2021-23887 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Privilege Escalation vulnerability in McAfee Data Loss Prevention (DLP) Endpoint for Windows prior to 11.6.100 allows a local, low privileged, attacker to write to arbitrary controlled kernel addresses. This is achieved by launching applications, suspending them, modifying the memory and restarting them when they are monitored by McAfee DLP through the hdlphook driver.

Learn more about our Web Application Penetration Testing UK.