Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT Security Bulletin ASB-2018.0229 McAfee fixes credential bypass vulnerability in DLP for Windows 5 October 2018 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: McAfee Data Loss Prevention Endpoint Operating System: Windows Impact/Access: Unauthorised Access -- Remote with User Interaction Resolution: Patch/Upgrade CVE Names: CVE-2018-6689 Member content until: Sunday, November 4 2018 OVERVIEW A vulnerability has been identified in McAfee Data Loss Prevention Endpoint for Windows prior to version 10.0.510 and 11.0.600. [1] IMPACT McAfee has provided the following information: "Vulnerability Description It is possible to access a user's session on a locked Windows machine if certain DLP Endpoint configurations are made by the DLP Endpoint administrator to include hyperlinks in user notification dialogs, and an actor performs specific actions on a protected machine. CVE-2018-6689 Authentication bypass vulnerability in McAfee Data Loss Prevention Endpoint (DLP Endpoint) 10.0.x earlier than 10.0.510, and 11.0.x earlier than 11.0.600 allows attackers to bypass local security protection via specific conditions. NOTE: The following link was not yet populated with CVE details at the time of publication of this Security Bulletin. http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-6689" [1] MITIGATION McAfee strongly recommends updating to DLP Endpoint for Windows versions 10.0.510 or 11.0.600. [1] REFERENCES [1] McAfee Security Bulletin - Data Loss Prevention Endpoint for Windows update fixes a credentials bypass vulnerability (CVE-2018-6689) https://kc.mcafee.com/corporate/index?page=content&id=SB10252 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBW7b43WaOgq3Tt24GAQgYCA/+KxFrYx6z1PW5dZzY5tuJDuzrwOmohPYl v2W0trs8pcLv/jPfPwSHMNC2rDUKIZ05Bmtzjin+5cOyguDFHMN1/19KPRJRUwwv /Rv9fJlvGCmHm2UWVTbxRPJsB4E26H807R/OFBCa1O4iiY9WDQvszUg0uMrBrtQT WDrliDemu9CBOlVZ7RKYVVhDqUBJ46Tkv7j0sd7CWjkJveZ2X4zQt+unNg43g5Oh GNPidCXvHCybQK0n36HsIEo3H4CROCIyG48zWo6eGNlNPBuLqz0JePrULgfbwzpD j9kkEll4F6fRw28RfMCYzP+GcuOU6DoGcLpaLwRGU9tr6raNqJ5Ti+J2CSyrpGzx CbmOrk5M+EZUKrGgi7R8r7+PGmAg2FW1kiWd9HqhtsyEzJBYSTJKRO4ajrV4hIo3 A+iioCG4hCyoeUIePqBiqeIZpEccu/9z0ciMIGyRUKd+QvbNXswgzvNDzoYU8vqK JqfxM8TiP7Ro4nUjFNw7yPJncL9TMP/Uw1oMb2NNI+0YKfzip8LtM1B1+GP3OUqO tS5giF2qF/o3ws2+xIAc5wSN/7jzl37egVQXA3tUMZ+d15VZVcI4YlUybEdotSvy cM6PqlpFR8rI0v3MBrDbDuEVqvPQL1vavkeJk+37kghjtFrjVeaF7/DnV7WYNMqR lr7TUjQDk5I= =eZpu -----END PGP SIGNATURE-----