-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2018.0229
      McAfee fixes credential bypass vulnerability in DLP for Windows
                              5 October 2018

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              McAfee Data Loss Prevention Endpoint
Operating System:     Windows
Impact/Access:        Unauthorised Access -- Remote with User Interaction
Resolution:           Patch/Upgrade
CVE Names:            CVE-2018-6689  
Member content until: Sunday, November  4 2018

OVERVIEW

        A vulnerability has been identified in McAfee Data Loss Prevention
        Endpoint for Windows prior to version 10.0.510 and 11.0.600. [1]


IMPACT

        McAfee has provided the following information:
        
        "Vulnerability Description
        It is possible to access a user's session on a locked Windows machine if
        certain DLP Endpoint configurations are made by the DLP Endpoint administrator
        to include hyperlinks in user notification dialogs, and an actor performs
        specific actions on a protected machine.
        
        CVE-2018-6689
        Authentication bypass vulnerability in McAfee Data Loss Prevention Endpoint
        (DLP Endpoint) 10.0.x earlier than 10.0.510, and 11.0.x earlier than 11.0.600
        allows attackers to bypass local security protection via specific conditions.
        NOTE: The following link was not yet populated with CVE details at the time of
        publication of this Security Bulletin.
        http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6689" [1]


MITIGATION

        McAfee strongly recommends updating to DLP Endpoint for Windows
        versions 10.0.510 or 11.0.600. [1]


REFERENCES

        [1] McAfee Security Bulletin - Data Loss Prevention Endpoint for
            Windows update fixes a credentials bypass vulnerability
            (CVE-2018-6689)
            https://kc.mcafee.com/corporate/index?page=content&id=SB10252

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iQIVAwUBW7b43WaOgq3Tt24GAQgYCA/+KxFrYx6z1PW5dZzY5tuJDuzrwOmohPYl
v2W0trs8pcLv/jPfPwSHMNC2rDUKIZ05Bmtzjin+5cOyguDFHMN1/19KPRJRUwwv
/Rv9fJlvGCmHm2UWVTbxRPJsB4E26H807R/OFBCa1O4iiY9WDQvszUg0uMrBrtQT
WDrliDemu9CBOlVZ7RKYVVhDqUBJ46Tkv7j0sd7CWjkJveZ2X4zQt+unNg43g5Oh
GNPidCXvHCybQK0n36HsIEo3H4CROCIyG48zWo6eGNlNPBuLqz0JePrULgfbwzpD
j9kkEll4F6fRw28RfMCYzP+GcuOU6DoGcLpaLwRGU9tr6raNqJ5Ti+J2CSyrpGzx
CbmOrk5M+EZUKrGgi7R8r7+PGmAg2FW1kiWd9HqhtsyEzJBYSTJKRO4ajrV4hIo3
A+iioCG4hCyoeUIePqBiqeIZpEccu/9z0ciMIGyRUKd+QvbNXswgzvNDzoYU8vqK
JqfxM8TiP7Ro4nUjFNw7yPJncL9TMP/Uw1oMb2NNI+0YKfzip8LtM1B1+GP3OUqO
tS5giF2qF/o3ws2+xIAc5wSN/7jzl37egVQXA3tUMZ+d15VZVcI4YlUybEdotSvy
cM6PqlpFR8rI0v3MBrDbDuEVqvPQL1vavkeJk+37kghjtFrjVeaF7/DnV7WYNMqR
lr7TUjQDk5I=
=eZpu
-----END PGP SIGNATURE-----