McAfee Total Protection prior to 16.0.50 may allow an adversary (with full administrative access) to modify a McAfee specific Component Object Model (COM) in the Windows Registry. This can result in the loading of a malicious payload.
Max CVSS
6.7
EPSS Score
0.04%
Published
2023-03-21
Updated
2023-03-27
McAfee Total Protection prior to 16.0.51 allows attackers to trick a victim into uninstalling the application via the command prompt.
Max CVSS
5.5
EPSS Score
0.05%
Published
2023-03-13
Updated
2023-03-22
McAfee Total Protection prior to 16.0.49 allows attackers to elevate user privileges due to DLL sideloading. This could enable a user with lower privileges to execute unauthorized tasks.
Max CVSS
5.5
EPSS Score
0.05%
Published
2023-03-13
Updated
2023-03-22
McAfee Total Protection prior to 16.0.50 allows attackers to elevate user privileges due to Improper Link Resolution via registry keys. This could enable a user with lower privileges to execute unauthorized tasks.
Max CVSS
5.5
EPSS Score
0.04%
Published
2023-03-13
Updated
2023-03-22
McAfee Total Protection prior to version 16.0.49 contains an uncontrolled search path element vulnerability due to the use of a variable pointing to a subdirectory that may be controllable by an unprivileged user. This may have allowed the unprivileged user to execute arbitrary code with system privileges.
Max CVSS
7.8
EPSS Score
0.07%
Published
2022-11-23
Updated
2022-11-28
Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by impersonating a client token which could lead to the bypassing of MTP self-defense.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-12
Updated
2021-05-20
Privilege escalation vulnerability in the Windows trial installer of McAfee Total Protection (MTP) prior to 16.0.34_x may allow a local user to run arbitrary code as the admin user by replacing a specific temporary file created during the installation of the trial version of MTP.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-10-26
Updated
2021-10-28
Bypass Remote Procedure call in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and perform arbitrary file modification as the SYSTEM user potentially causing Denial of Service via executing carefully constructed malware.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-02-10
Updated
2023-11-16

CVE-2021-23874

Known exploited
Arbitrary Process Execution vulnerability in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and execute arbitrary code bypassing MTP self-defense.
Max CVSS
8.2
EPSS Score
0.11%
Published
2021-02-10
Updated
2023-06-30
CISA KEV Added
2021-11-03
Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.30 allows a local user to gain elevated privileges and perform arbitrary file deletion as the SYSTEM user potentially causing Denial of Service via manipulating Junction link, after enumerating certain files, at a specific time.
Max CVSS
7.8
EPSS Score
0.06%
Published
2021-02-10
Updated
2022-05-03
Privilege Escalation vulnerability in the File Lock component of McAfee Total Protection (MTP) prior to 16.0.32 allows a local user to gain elevated privileges by manipulating a symbolic link in the IOCTL interface.
Max CVSS
7.8
EPSS Score
0.04%
Published
2021-05-12
Updated
2022-05-03
Privilege Escalation vulnerability in Microsoft Windows client McAfee Total Protection (MTP) prior to 16.0.29 allows local users to gain elevated privileges via careful manipulation of a folder by creating a junction link. This exploits a lack of protection through a timing issue and is only exploitable in a small time window.
Max CVSS
7.8
EPSS Score
0.05%
Published
2020-12-01
Updated
2020-12-08
Privilege Escalation vulnerability in McAfee Total Protection (MTP) trial prior to 4.0.176.1 allows local users to schedule tasks which call malicious software to execute with elevated privileges via editing of environment variables
Max CVSS
8.8
EPSS Score
0.04%
Published
2020-10-14
Updated
2020-10-27
Privilege Escalation vulnerability in the installer in McAfee McAfee Total Protection (MTP) trial prior to 4.0.161.1 allows local users to change files that are part of write protection rules via manipulating symbolic links to redirect a McAfee file operations to an unintended file.
Max CVSS
6.9
EPSS Score
0.04%
Published
2020-08-21
Updated
2022-06-01
Unexpected behavior violation in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to turn off real time scanning via a specially crafted object making a specific function call.
Max CVSS
8.4
EPSS Score
0.04%
Published
2020-08-05
Updated
2021-07-21
Privilege Escalation vulnerability in McAfee Total Protection (MTP) before 16.0.R26 allows local users to create and edit files via symbolic link manipulation in a location they would otherwise not have access to. This is achieved through running a malicious script or program on the target machine.
Max CVSS
8.8
EPSS Score
0.04%
Published
2020-07-03
Updated
2020-07-13
Privilege Escalation vulnerability in McAfee Total Protection (MTP) before 16.0.R26 allows local users to delete files the user would otherwise not have access to via manipulating symbolic links to redirect a McAfee delete action to an unintended file. This is achieved through running a malicious script or program on the target machine.
Max CVSS
7.5
EPSS Score
0.04%
Published
2020-07-03
Updated
2022-07-01
Privilege Escalation vulnerability in McAfee Total Protection (MTP) prior to 16.0.R26 allows local users to delete files the user would otherwise not have access to via manipulating symbolic links to redirect a McAfee delete action to an unintended file. This is achieved through running a malicious script or program on the target machine.
Max CVSS
7.5
EPSS Score
0.04%
Published
2020-07-03
Updated
2022-07-01
A Privilege Escalation vulnerability in the Microsoft Windows client in McAfee Total Protection 16.0.R22 and earlier allows administrators to execute arbitrary code via carefully placing malicious files in specific locations protected by administrator permission.
Max CVSS
7.2
EPSS Score
0.04%
Published
2019-11-13
Updated
2020-08-24
DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Free Antivirus Trial 16.0.R18 and earlier allows local users to execute arbitrary code via execution from a compromised folder placed by an attacker with administrator rights.
Max CVSS
6.9
EPSS Score
0.04%
Published
2019-09-13
Updated
2019-10-09
A File Masquerade vulnerability in McAfee Total Protection (MTP) version 16.0.R21 and earlier in Windows client allowed an attacker to read the plaintext list of AV-Scan exclusion files from the Windows registry, and to possibly replace excluded files with potential malware without being detected.
Max CVSS
7.8
EPSS Score
0.04%
Published
2019-10-28
Updated
2020-08-24
Privilege escalation vulnerability in McAfee Total Protection (ToPS) for Mac OS prior to 4.6 allows local users to gain root privileges via incorrect protection of temporary files.
Max CVSS
8.2
EPSS Score
0.04%
Published
2020-06-10
Updated
2020-06-16
Exploitation of Privilege/Trust vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.R18 allows local users to bypass product self-protection, tamper with policies and product files, and uninstall McAfee software without permission via specially crafted malware.
Max CVSS
7.5
EPSS Score
0.04%
Published
2019-01-28
Updated
2020-08-24
DLL Search Order Hijacking vulnerability in Microsoft Windows client in McAfee Total Protection (MTP) Prior to 16.0.18 allows local users to execute arbitrary code via execution from a compromised folder.
Max CVSS
7.2
EPSS Score
0.04%
Published
2019-01-23
Updated
2019-10-09
Maliciously misconfigured registry vulnerability in all Microsoft Windows products in McAfee consumer and corporate products allows an administrator to inject arbitrary code into a debugged McAfee process via manipulation of registry parameters.
Max CVSS
5.0
EPSS Score
0.04%
Published
2018-04-03
Updated
2019-10-09
26 vulnerabilities found
1 2
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!