cancel
Showing results for 
Search instead for 
Did you mean: 
Zebu
Level 9
Report Inappropriate Content
Message 1 of 3

Windows Shell Remote Code Execution Vulnerability

Jump to solution

Hello,

We are updating february hotfix on ENS 10.6.1.1208 and 10.6.1.1128 and we are getting the following alert from ePO:

Event Category:'File' class or access
Event ID:18060
Threat Severity:Critical
Threat Name:Windows Shell Remote Code Execution Vulnerability
Threat Type:Exploit Prevention
Action Taken:Would block
Threat Handled:TRUE
Analyzer Detection Method:Exploit Prevention
Events received from managed systems 
Event Description:Exploit Prevention Files/Process/Registry violation detected

 

We have update 950 systems so far and getting this alert from around 200 systems after the hotfix is installed.

In all cases the source process name is winword, powerpoint, excel exes and the threat target file path is C:\USERS\*username*\APPDATA\LOCAL\TEMP\DEPLOYMENT.

Is anyone experienced this issue?

Thank you for your answers.


Best Regards

 

Zebu

1 Solution

Accepted Solutions
jess_arman McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 3 of 3

Re: Windows Shell Remote Code Execution Vulnerability

Jump to solution

@NimrodMiz If your rule is set to report only, and you would no longer like to see the reported events, you could turn off reporting of the rule. 

If that is not the situation, please provide some additional details to the context of the situation in which this behavior is occurring, so we could make a more tailored recommendation. If you'd like detailed review of the logs in order to reach that end, then I would recommend that you reach out to Technical Support for assistance in review.

 

Was my reply helpful?

If this information was helpful in any way, or answered your question, will you please select "Accept as Solution" in my reply, or give kudos as appropriate, so together we can help other members?

View solution in original post

2 Replies

Re: Windows Shell Remote Code Execution Vulnerability

Jump to solution

Hey,

 

I am experiencing this issue as well, with May Update.

What can we do about this?

 

Thanks,

Nimrod.

jess_arman McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 3 of 3

Re: Windows Shell Remote Code Execution Vulnerability

Jump to solution

@NimrodMiz If your rule is set to report only, and you would no longer like to see the reported events, you could turn off reporting of the rule. 

If that is not the situation, please provide some additional details to the context of the situation in which this behavior is occurring, so we could make a more tailored recommendation. If you'd like detailed review of the logs in order to reach that end, then I would recommend that you reach out to Technical Support for assistance in review.

 

Was my reply helpful?

If this information was helpful in any way, or answered your question, will you please select "Accept as Solution" in my reply, or give kudos as appropriate, so together we can help other members?

View solution in original post

You Deserve an Award
Don't forget, when your helpful posts earn a kudos or get accepted as a solution you can unlock perks and badges. Those aren't the only badges, either. How many can you collect? Click here to learn more.

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community