{"id":287,"date":"2020-07-14T05:37:11","date_gmt":"2020-07-14T05:37:11","guid":{"rendered":"http:\/\/labs.redyops.com\/?p=287"},"modified":"2020-09-22T06:57:25","modified_gmt":"2020-09-22T06:57:25","slug":"mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283","status":"publish","type":"post","link":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/","title":{"rendered":"McAfee Total Protection (MTP) < 16.0.R26 Escalation of Privilege (CVE-2020-7283)"},"content":{"rendered":"<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/\" data-a2a-title=\"McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h1>\n\n\n\n<p><strong>Assigned CVE<\/strong>: <em>CVE-2020-7283<\/em> has been assigned and RedyOps Labs has been publicly acknowledged by the vendor.<\/p>\n\n\n\n<p><strong>Known to Neurosoft&#8217;s RedyOps Labs since<\/strong>: 09\/03\/2020<\/p>\n\n\n\n<p><strong>Exploit<\/strong> <strong>Code<\/strong>: <a href=\"https:\/\/github.com\/RedyOpsResearchLabs\/CVE-2020-7283-McAfee-Total-Protection-MTP-16.0.R26-EoP\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">https:\/\/github.com\/RedyOpsResearchLabs\/CVE-2020-7283-McAfee-Total-Protection-MTP-16.0.R26-EoP<\/a><\/p>\n\n\n\n<p><strong>Vendor&#8217;s Advisory<\/strong>: <a href=\"https:\/\/service.mcafee.com\/webcenter\/portal\/oracle\/webcenter\/page\/scopedMD\/s55728c97_466d_4ddb_952d_05484ea932c6\/Page29.jspx?showFooter=false&amp;articleId=TS103062&amp;leftWidth=0%25&amp;showHeader=false&amp;wc.contextURL=%2Fspaces%2Fcp&amp;rightWidth=0%25&amp;centerWidth=100%25&amp;_adf.ctrl-state=72mvomkv4_9&amp;_afrLoop=1512627449091793#!\" target=\"_blank\" aria-label=\"undefined (opens in a new tab)\" rel=\"noreferrer noopener\">https:\/\/service.mcafee.com\/webcenter\/portal\/oracle\/webcenter\/page\/scopedMD\/s55728c97_466d_4ddb_952d_05484ea932c6\/Page29.jspx?showFooter=false&amp;articleId=TS103062&amp;leftWidth=0%25&amp;showHeader=false&amp;wc.contextURL=%2Fspaces%2Fcp&amp;rightWidth=0%25&amp;centerWidth=100%25&amp;_adf.ctrl-state=72mvomkv4_9&amp;_afrLoop=1512627449091793#!<\/a> <\/p>\n\n\n\n<p>An Elevation of Privilege (EoP) exists in McAfee Total Protection (MTP) &lt; 16.0.R26 . The latest version we tested is  McAfee Total Protection (MTP) 16.0.R23. The exploitation of this EoP ,  gives the ability to a low privileged user to create a file anywhere in the system. The file is being created with a DACL , which allows any user to edit the file. Because of this, the attacker can create a file with any chosen name.extension and edit it in order to execute the code of his choice. <\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><img loading=\"lazy\" decoding=\"async\" width=\"1018\" height=\"146\" src=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/procmon.png\" alt=\"\" class=\"wp-image-299\"\/><\/figure><\/div>\n\n\n\n<p>If the file already exists, it will be overwritten, with an empty file.&nbsp;<\/p>\n\n\n\n<p>There are many ways to abuse this issue. We chose to create a bat file in the Users Startup folder C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\backdoor.bat  .<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Description<\/strong><\/h1>\n\n\n\n<p>Whenever a scan is initiated, the process MMSSHOST.EXE which runs as an NT AUTHORITY\\SYSTEM, and without impersonation, creates the file c:\\ProgramData\\McAfee\\MSK\\settingsdb.dat . <\/p>\n\n\n\n<p>The permissions which are assigned to this file, allow to the &#8220;Authenticated Users&#8221; to have full control over the file.<\/p>\n\n\n\n<p>When we first log into the windows system and without performing any actions, the file c:\\ProgramData\\McAfee\\MSK\\settingsdb.dat and the files MSK*.dat in the same folder, are not locked (they are not used by any program) and we have the proper permissions in order to delete them.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large is-resized\"><img loading=\"lazy\" decoding=\"async\" src=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/msk.png\" alt=\"\" class=\"wp-image-300\" width=\"349\" height=\"466\"\/><\/figure><\/div>\n\n\n\n<p>After we delete these files, we can make &#8220;C:\\ProgramData\\McAfee\\MSK\\settingsdb.dat&#8221;, a symlink to any chosen file. <\/p>\n\n\n\n<p>With the symlink in place, the initiation of a scan will trigger the execution of the MMSSHOST.EXE. <\/p>\n\n\n\n<p>At this very moment, If we initiate a scan, the MMSSHOST.EXE will try to create the file C:\\ProgramData\\McAfee\\MSK\\settingsdb.dat , it will follow the symlink and will actually create the file which is pointed by the symlink. <\/p>\n\n\n\n<p>After that, it will set the new permissions to that file, which allows to the &#8220;Authenticated Users&#8221; to have full control over the newly created file. Most of the times, the newly created file will remain locked and we will not be able to edit it until we reboot. After the reboot, the file is unlocked and we can edit the file and add any contents we like.<\/p>\n\n\n\n<p><strong>Note<\/strong>: Although we exploited the issue by creating symlinks of the files under the path c:\\ProgramData\\McAfee\\MSK\\ , the files under the folder c:\\ProgramData\\McAfee\\MPF\\ seem to be affected  as well.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Exploitation<\/strong><\/h1>\n\n\n\n<p>In order to Exploit the issue, you can use our exploit from our <a aria-label=\"undefined (opens in a new tab)\" href=\"https:\/\/github.com\/RedyOpsResearchLabs\/CVE-2020-7283-McAfee-Total-Protection-MTP-16.0.R26-EoP\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a> . <\/p>\n\n\n\n<p>In the following paragraph, a step by step explanation of the Video PoC where we use the exploit is provided.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Video PoC Step By Step<\/strong><\/h1>\n\n\n\n<p>The exploit takes as an argument the file you want to create . <\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"CVE 2020 7283 PoC\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/jF7zidrTJHo?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>00:00-02:03: We present the environment. We are low privileged users and as we can see by default, the low privileged users cannot create files under the folder C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup . The folder at the moment is empty.<\/p>\n\n\n\n<p>02:03-02:35: We run the exploit and we pass the file we want to create as argument. In this example we pass as argument the &#8220;C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\backdoor.bat&#8221;. When the exploit instructs us to scan a file, we perform the scan and the file is created.<\/p>\n\n\n\n<p>02:35-03:23: We present the fact that attacker has full access over the file. Moreover, we add the line &#8220;notepad.exe&#8221;, which is going to execute the notepad.exe  in the context of any user which perform a login into the system. This is a bat file, so you can add the code of your choice (for example a reverse shell).<\/p>\n\n\n\n<p>3:23-end: After the exploitation, another user logs into the system. In our example the administrator. The notepad.exe is executed because of the &#8220;C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\Startup\\backdoor.bat&#8221; file.<\/p>\n\n\n\n<p><\/p>\n\n\n<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/\" data-a2a-title=\"McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F07%2F14%2Fmcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283%2F&amp;linkname=McAfee%20Total%20Protection%20%28MTP%29%20%3C%2016.0.R26%20Escalation%20of%20Privilege%20%28CVE-2020-7283%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Resources<\/strong><\/h1>\n\n\n\n<p><strong>GitHub<\/strong><\/p>\n\n\n\n<p>You can find the exploit code in our GitHub at&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/RedyOpsResearchLabs\/SEP-14.2-Arbitrary-Write\" target=\"_blank\">https:\/\/github.com\/RedyOpsResearchLabs\/SEP-14.2-Arbitrary-Write<\/a> <\/p>\n\n\n\n<p><strong>RedyOps team<\/strong><\/p>\n\n\n\n<p>RedyOps team, uses the 0-day exploits produced by Research Labs, before vendor releases any patch. They use it in special engagements and only for specific customers.<\/p>\n\n\n\n<p>You can find RedyOps team at&nbsp;<a href=\"https:\/\/redyops.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/redyops.com\/<\/a><\/p>\n\n\n\n<p><strong>Angel<\/strong><\/p>\n\n\n\n<p>Discovered 0-days which affect marine sector, are being contacted with the Angel Team. ANGEL has been designed and developed to meet the unique and diverse requirements of the merchant marine sector. It secures the vessel\u2019s business, IoT and crew networks by providing oversight, security threat alerting and control of the vessel\u2019s entire network.<\/p>\n\n\n\n<p>You can find Angel team at&nbsp;<a href=\"https:\/\/angelcyber.gr\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/angelcyber.gr\/<\/a><\/p>\n\n\n\n<p><strong>Illicium<\/strong><\/p>\n\n\n\n<p>Our 0-days cannot win Illicium. Today\u2019s information technology landscape is threatened by modern adversary security attacks, including 0-day exploits, polymorphic malwares, APTs and targeted attacks. These threats cannot be identified and mitigated using classic detection and prevention technologies; they can mimic valid user activity, do not have a signature, and do not occur in patterns. In response to attackers\u2019 evolution, defenders now have a new kind of weapon in their arsenal: Deception.<\/p>\n\n\n\n<p>You can find Illicium team at&nbsp;<a href=\"https:\/\/deceivewithillicium.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/deceivewithillicium.com\/<\/a><\/p>\n\n\n\n<p><strong>Neutrify<\/strong><\/p>\n\n\n\n<p>Discovered 0-days are being contacted to the Neutrify team, in order to develop related detection rules. Neutrify is Neurosoft\u2019s 24\u00d77 Security Operations Center, completely dedicated to threats monitoring and attacks detection. Beyond just monitoring, Neutrify offers additional capabilities including advanced forensic analysis and malware reverse engineering to analyze incidents.<\/p>\n\n\n\n<p>You can find Neutrify team at&nbsp;<a href=\"https:\/\/neurosoft.gr\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/neurosoft.gr\/contact\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Assigned CVE: CVE-2020-7283 has been assigned and RedyOps Labs has been publicly acknowledged by the vendor. Known to Neurosoft&#8217;s RedyOps Labs since: 09\/03\/2020 Exploit Code: https:\/\/github.com\/RedyOpsResearchLabs\/CVE-2020-7283-McAfee-Total-Protection-MTP-16.0.R26-EoP Vendor&#8217;s Advisory: https:\/\/service.mcafee.com\/webcenter\/portal\/oracle\/webcenter\/page\/scopedMD\/s55728c97_466d_4ddb_952d_05484ea932c6\/Page29.jspx?showFooter=false&amp;articleId=TS103062&amp;leftWidth=0%25&amp;showHeader=false&amp;wc.contextURL=%2Fspaces%2Fcp&amp;rightWidth=0%25&amp;centerWidth=100%25&amp;_adf.ctrl-state=72mvomkv4_9&amp;_afrLoop=1512627449091793#! An Elevation of Privilege (EoP) exists in McAfee Total Protection (MTP) &lt; 16.0.R26 . The latest version we tested is McAfee Total Protection (MTP) 16.0.R23. &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;McAfee Total Protection (MTP) < 16.0.R26 Escalation of Privilege (CVE-2020-7283)\"<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17,4],"tags":[22,3,27],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>McAfee Total Protection (MTP) &lt; 16.0.R26 EoP (CVE-2020-7283)<\/title>\n<meta name=\"description\" content=\"Exploit Code and WriteUp for McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"McAfee Total Protection (MTP) &lt; 16.0.R26 EoP (CVE-2020-7283)\" \/>\n<meta property=\"og:description\" content=\"Exploit Code and WriteUp for McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/\" \/>\n<meta property=\"og:site_name\" content=\"REDYOPS Labs\" \/>\n<meta property=\"article:published_time\" content=\"2020-07-14T05:37:11+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-09-22T06:57:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/McAfee.png\" \/>\n\t<meta property=\"og:image:width\" content=\"994\" \/>\n\t<meta property=\"og:image:height\" content=\"509\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"McAfee Total Protection (MTP) &lt; 16.0.R26 EoP (CVE-2020-7283)\" \/>\n<meta name=\"twitter:description\" content=\"Exploit Code and WriteUp for McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/McAfee.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/\",\"url\":\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/\",\"name\":\"McAfee Total Protection (MTP) &lt; 16.0.R26 EoP (CVE-2020-7283)\",\"isPartOf\":{\"@id\":\"https:\/\/labs.redyops.com\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/procmon.png\",\"datePublished\":\"2020-07-14T05:37:11+00:00\",\"dateModified\":\"2020-09-22T06:57:25+00:00\",\"author\":{\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\"},\"description\":\"Exploit Code and WriteUp for McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)\",\"breadcrumb\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#primaryimage\",\"url\":\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/procmon.png\",\"contentUrl\":\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/procmon.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/labs.redyops.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"McAfee Total Protection (MTP) < 16.0.R26 Escalation of Privilege (CVE-2020-7283)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/labs.redyops.com\/#website\",\"url\":\"https:\/\/labs.redyops.com\/\",\"name\":\"REDYOPS Labs\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/labs.redyops.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/labs.redyops.com\"],\"url\":\"https:\/\/labs.redyops.com\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"McAfee Total Protection (MTP) &lt; 16.0.R26 EoP (CVE-2020-7283)","description":"Exploit Code and WriteUp for McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/","og_locale":"en_US","og_type":"article","og_title":"McAfee Total Protection (MTP) &lt; 16.0.R26 EoP (CVE-2020-7283)","og_description":"Exploit Code and WriteUp for McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)","og_url":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/","og_site_name":"REDYOPS Labs","article_published_time":"2020-07-14T05:37:11+00:00","article_modified_time":"2020-09-22T06:57:25+00:00","og_image":[{"width":994,"height":509,"url":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/McAfee.png","type":"image\/png"}],"author":"admin","twitter_card":"summary_large_image","twitter_title":"McAfee Total Protection (MTP) &lt; 16.0.R26 EoP (CVE-2020-7283)","twitter_description":"Exploit Code and WriteUp for McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)","twitter_image":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/McAfee.png","twitter_misc":{"Written by":"admin","Est. reading time":"5 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/","url":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/","name":"McAfee Total Protection (MTP) &lt; 16.0.R26 EoP (CVE-2020-7283)","isPartOf":{"@id":"https:\/\/labs.redyops.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#primaryimage"},"image":{"@id":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#primaryimage"},"thumbnailUrl":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/procmon.png","datePublished":"2020-07-14T05:37:11+00:00","dateModified":"2020-09-22T06:57:25+00:00","author":{"@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69"},"description":"Exploit Code and WriteUp for McAfee Total Protection (MTP) &lt; 16.0.R26 Escalation of Privilege (CVE-2020-7283)","breadcrumb":{"@id":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#primaryimage","url":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/procmon.png","contentUrl":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/07\/procmon.png"},{"@type":"BreadcrumbList","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/07\/14\/mcafee-total-protection-mtp-16-0-r26-escalation-of-privilege-cve-2020-7283\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/labs.redyops.com\/"},{"@type":"ListItem","position":2,"name":"McAfee Total Protection (MTP) < 16.0.R26 Escalation of Privilege (CVE-2020-7283)"}]},{"@type":"WebSite","@id":"https:\/\/labs.redyops.com\/#website","url":"https:\/\/labs.redyops.com\/","name":"REDYOPS Labs","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/labs.redyops.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/labs.redyops.com"],"url":"https:\/\/labs.redyops.com\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/287"}],"collection":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/comments?post=287"}],"version-history":[{"count":8,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/287\/revisions"}],"predecessor-version":[{"id":328,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/287\/revisions\/328"}],"wp:attachment":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/media?parent=287"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/categories?post=287"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/tags?post=287"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}