cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
AdithyanT
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 1 of 3

McAfee coverage for July 2021 CVE-2021-36934 "HiveNightmare/SeriousSAM" vulnerability

Jump to solution

Hi All,

McAfee is aware of the "HiveNightmare/SeriousSAM" vulnerability, CVE-2021-36934, and is investigating product countermeasures. This article will be updated as we learn more. 

Article Reference here: https://kc.mcafee.com/corporate/index?page=content&id=KB94710

Workaround
Microsoft's Security Response Center recommends restricting access to the contents of %windir%\system32\config\ and deleting any Volume Shadow Copy Service (VSS) shadow copies that were created before restricting access. For more information, see: Microsoft update guide on CVE-2021-36934.

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Thanks and regards,
Adithyan T
1 Solution

Accepted Solutions
AdithyanT
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 3

Re: McAfee coverage for July 2021 CVE-2021-36934 "HiveNightmare/SeriousSAM" vulnerability

Jump to solution

Solution via Expert rule:

Rule Name Block CVE-2021-36934: 'HiveNightmare/SeriousSam'
Severity High
Action
  • Block
  • Report
Rule type Files
Rule content Rule {
    Process {
        Include AggregateMatch -xtype "ex1" {
            Exclude VTP_PRIVILEGES -type BITMASK { -v 0x8 }
        }
        Include AggregateMatch -xtype "ex2" {
            Exclude GROUP_SID { -v "S-1-16-16384" }
            Exclude GROUP_SID { -v "S-1-16-12288" }
        }
        Include AggregateMatch -xtype "ex3" {
            Exclude OBJECT_NAME { -v "vssadmin.exe" }
        }
    }
    Target {
        Match FILE {
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SAM" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SYSTEM" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SOFTWARE" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SECURITY" }
            Include -access "READ"
        }
    }
}

 

Edit: Edited the rule on 24 July 2021 to match the new rule updated on KBA.

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Thanks and regards,
Adithyan T

View solution in original post

2 Replies
AdithyanT
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 3

Re: McAfee coverage for July 2021 CVE-2021-36934 "HiveNightmare/SeriousSAM" vulnerability

Jump to solution

Solution via Expert rule:

Rule Name Block CVE-2021-36934: 'HiveNightmare/SeriousSam'
Severity High
Action
  • Block
  • Report
Rule type Files
Rule content Rule {
    Process {
        Include AggregateMatch -xtype "ex1" {
            Exclude VTP_PRIVILEGES -type BITMASK { -v 0x8 }
        }
        Include AggregateMatch -xtype "ex2" {
            Exclude GROUP_SID { -v "S-1-16-16384" }
            Exclude GROUP_SID { -v "S-1-16-12288" }
        }
        Include AggregateMatch -xtype "ex3" {
            Exclude OBJECT_NAME { -v "vssadmin.exe" }
        }
    }
    Target {
        Match FILE {
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SAM" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SYSTEM" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SOFTWARE" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SECURITY" }
            Include -access "READ"
        }
    }
}

 

Edit: Edited the rule on 24 July 2021 to match the new rule updated on KBA.

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Thanks and regards,
Adithyan T

View solution in original post

SWISS
Reliable Contributor
Reliable Contributor
Report Inappropriate Content
Message 3 of 3

Re: McAfee coverage for July 2021 CVE-2021-36934 "HiveNightmare/SeriousSAM" vulnerability

Jump to solution

I mean HOW do you know you don't target software that also uses vssadmin.exe like Veaam, Acronis, DIsk2VHD or PowerShell Scripts which do a snapshot before they change large amount of critical things like Bloatware uninstallers etc.

How should we test that? It will take a week or so? How do you want to catch a 0day with a -7day_test?

Please Explain? Are we too stupid to understand?

And finally and for once explain if such an expert rules is posted here WHEN and FAST will it appear under regular EPO-Server and ENS so customers can activate it? How is that that process and timeline? Like the AMCORE at 17:00 CET or when?

 

 

 

 

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community