Showing results for 
Show  only  | Search instead for 
Did you mean: 

Exploit Prevention Rule 6182 - CVE_2020_1472 Zerologon attack

I've placed Exploit Prevention rule 6182 - CVE_2020_1472 Zerologon attack, into report mode and immediately I'm seeing hits against "C:\WINDOWS\system32\drivers\MfeEpNfcp.sys" and "C:\WINDOWS\SYSTEM32\SPOOLSV.EXE". I'm fairly sure these are false positives but do I white list them in the Exploit Prevent exclusions, which excludes them from all rules?

1 Reply
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 2

Re: Exploit Prevention Rule 6182 - CVE_2020_1472 Zerologon attack

Hi @cybercop 

Thanks for reaching out to community. 

If these are false detections, I request you to open an SR with point product as MALWARE and description as "Exploit Prevention False positive" and we can escalate to our labs and get this addressed. 

This needs to be addressed by our Content Team and white list accordingly. 

Was my reply helpful?

If yes, please give me kudo. If I have answered your query, please mark this as solution and together we help other community members. 

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community