Skip to main content

CVE-2018-6668: whitelist bypass vulnerability in McAfee Application and Change Control

Medium
VulnerabilityCVE-2018-6668cvecve-2018-6668
Published: Mon Dec 31 2018 (12/31/2018, 18:00:00 UTC)
Source: CVE
Vendor/Project: McAfee
Product: Application and Change Control

Description

A whitelist bypass vulnerability in McAfee Application Control / Change Control 7.0.1 and before allows execution bypass, for example, with simple DLL through interpreters such as PowerShell.

AI-Powered Analysis

AILast updated: 07/05/2025, 17:54:46 UTC

Technical Analysis

CVE-2018-6668 is a vulnerability identified in McAfee Application Control and Change Control version 7.0.1 and earlier. This vulnerability allows an attacker to bypass the whitelist enforcement mechanism implemented by these products. Specifically, the flaw enables execution bypass through simple DLL files when used with interpreters such as PowerShell. McAfee Application Control is designed to restrict execution of unauthorized applications by maintaining a whitelist of approved executables. The bypass vulnerability undermines this security control by allowing unapproved code to execute despite the whitelist restrictions. The vulnerability is classified with a CVSS v3.0 base score of 6.1, indicating a medium severity level. The vector metrics indicate that the attack requires local access (AV:L), low attack complexity (AC:L), and low privileges (PR:L), but no user interaction (UI:N). The impact primarily affects availability (A:H) with limited confidentiality impact (C:L) and no integrity impact (I:N). The vulnerability does not appear to have known exploits in the wild as of the last update. The root cause involves insufficient validation of DLL execution paths or interpreter usage, allowing attackers to leverage scripting environments like PowerShell to run unauthorized code despite whitelist policies. This can lead to denial of service or disruption of application control enforcement, potentially enabling further malicious activities on the affected system.

Potential Impact

For European organizations, this vulnerability poses a risk to endpoint security and application control integrity. Organizations relying on McAfee Application Control to enforce strict application whitelisting may find their defenses circumvented, allowing unauthorized code execution. This could lead to service disruptions, unauthorized software running on critical systems, or a foothold for attackers to escalate privileges or move laterally within networks. The confidentiality impact is limited, but the availability impact is significant, as attackers could disrupt normal operations or disable security controls. Given the reliance on PowerShell in many Windows environments, this vulnerability could be exploited by insiders or attackers with limited access to bypass controls. European organizations in sectors with high regulatory requirements for software integrity and availability, such as finance, healthcare, and critical infrastructure, could face compliance and operational risks if this vulnerability is exploited.

Mitigation Recommendations

Organizations should upgrade McAfee Application Control and Change Control to versions later than 7.0.1 where this vulnerability is patched. If immediate patching is not possible, administrators should restrict local user privileges to minimize the ability to execute PowerShell scripts or load unauthorized DLLs. Implementing strict PowerShell execution policies and monitoring PowerShell activity can help detect and prevent exploitation attempts. Additionally, applying application control policies that include script interpreters and DLLs explicitly can reduce the attack surface. Network segmentation and endpoint detection and response (EDR) solutions should be used to monitor for suspicious behavior indicative of whitelist bypass attempts. Regular audits of whitelist policies and execution logs will help identify anomalies. Finally, educating users about the risks of executing unauthorized scripts and maintaining strong access controls will further reduce exploitation likelihood.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
trellix
Date Reserved
2018-02-06T00:00:00.000Z
Cisa Enriched
true
Cvss Version
3.0
State
PUBLISHED

Threat ID: 682d981cc4522896dcbda356

Added to database: 5/21/2025, 9:08:44 AM

Last enriched: 7/5/2025, 5:54:46 PM

Last updated: 8/18/2025, 12:02:25 AM

Views: 13

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats