Knowledge Center

McAfee Security Bulletin - McAfee Application Control / Change Control update fixes password bypass issue
Security Bulletins ID:   SB10023
Last Modified:  1/6/2017


 Who should read this document:  Technical and Security Personnel
 Impact of Vulnerability:  Privilege Escalation
 CVE Number:  None
 Severity Rating:  High
 Overall CVSS Rating:  4.5
 Recommendations:  Install McAfee Application Control/Change Control hotfix 
 Security Bulletin Replacement:  None
 Caveats:  None
 Affected Software:  McAfee Application Control / Change Control 5.1.x / 6.0.0
 Location of updated software:  http://www.mcafee.com/us/downloads  


This update resolves an issue discovered while running password-protected commands in McAfee Application Control / Change Control 5.1.x / 6.0.0. A hotfix is available to mitigate the issue where the user is not prompted for the password while running password protected commands.

This flaw is encountered if the user sets certain attributes of the client password file to prevent the sadmin command execution. This overrides the prevention mechanism and the user is not prompted for the password while running any of the password-protected commands. Specifically, this flaw is encountered if the <install dir>\solidcore\passwd file attribute is set as read-only.

This flaw requires access to the local computer to set the attribute of the passwd file to read-only. It is therefore considered a local-only attack, although if remote drive access is enabled, the files can be accessed remotely.


Application Control / Change Control 5.1.x / 6.0.0 hotfix download Instructions:
  1. Launch Internet Explorer.
  2. Navigate to: http://www.mcafee.com/us/downloads.
  3. Enter your grant number.
  4. Select the product and click View Available Downloads.
  5. Click McAfee Application Control or McAfee Change Control.
  6. Click the Patches tab, then click the link to download the .ZIP file for your product version:
    • 5.1.0: SOLIDCOR5.1.0-9901_WIN.zip
    • 5.1.1: SOLIDCOR5.1.1-9801_WIN.zip
    • 5.1.2: SOLIDCOR512-8163_WIN.zip
    • 6.0.0: SOLIDCOR600-9703_WIN.zip
For instructions on how to install / upgrade this hotfix, review the Release Notes and Installation Guide (available from the Documentation tab).


McAfee credits Sebastian Obermeier of ABB Corporate Research for reporting this flaw.


Corporate Technical Support:

Frequently Asked Questions (FAQs)

Who is affected by this security vulnerability?
McAfee Application Control / Change Control 5.1.0, 5.1.1, 5.1.2 and 6.0.0 (SolidCore).
McAfee recommends that all customers verify that they have applied the latest updates.

What issues does this hotfix address?
  • 754885 (Event viewer Shows Password For 'sadmin recover -z solidcore' Command) - applicable to 6.0.0 version only
  • 758233 (Solidcore password file attribute modifications are not protected in Enabled mode) - applicable to all versions earlier than 6.0.0
Does this vulnerability affect McAfee enterprise products?
Yes, McAfee Application Control / Change Control 5.1.x / 6.0.0 are enterprise products.

What is CVSS?
CVSS, or Common Vulnerability Scoring System, is the result of the National Infrastructure Advisory Council’s effort to standardize a system of assessing the criticality of a vulnerability. This system offers an unbiased criticality score that customers can use to judge how critical a vulnerability is and plan accordingly. For more information, please visit the CVSS website at: http://www.first.org/cvss/

What are the CVSS scoring metrics that have been used?
 Base Score  5.2
 Access Vector  Local
 Access Complexity  Low
 Authentication  Single Instance
 Confidentiality Impact  Partial
 Integrity Impact  Complete
 Availability Impact  None
 Adjusted Temporal Score  4.5
 Exploitability  High
 Remediation Level  Official fix
 Report Confidence  Confirmed

NOTE: CVSS version 2.0 was used to generate this score. http://nvd.nist.gov/cvss.cfm?calculator&version=2

What has McAfee done to resolve the issue?
McAfee released a hotfix to address this security flaw on April 25th, 2012.

Where do I download the fix?
When ready, the hotfix can be downloaded from: http://www.mcafee.com/us/downloads  
User will need to provide their McAfee Grant Number to initiate the download.  

How does McAfee respond to this and any other security flaws?
McAfee’s key priority is the security of our customers. In the event that a vulnerability is found within any of McAfee’s software, we work closely with the relevant security research group to ensure rapid and effective development of a fix and communication plan. McAfee is an active member of the Organization for Internet Safety (OIS), which is dedicated to developing guidelines and best practices for the reporting and fixing of software vulnerabilities.




The information provided in this security bulletin is provided as is without warranty of any kind. McAfee disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose. In no event shall McAfee or its suppliers be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages, even if McAfee or its suppliers have been advised of the possibility of such damages. Some states do not allow the exclusion or limitation of liability for consequential or incidental damages so the foregoing limitation may not apply.

Rate this document

Did this article resolve your issue?

Please provide any comments below

Beta Translate with

Select a desired language below to translate this page.

Glossary of Technical Terms

 Highlight Glossary Terms

Please take a moment to browse our Glossary of Technical Terms.