cancel
Showing results for 
Show  only  | Search instead for 
Did you mean: 
AdithyanT
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 1 of 3

McAfee Coverage for hivenightmare aka serioussam | CVE-2021-36934

Jump to solution

Hi All,

We expect this Exploit to be prevented by existing Exploit Prevention Signature - Signature 6143: Attempt to Dump Password Hash from SAM Database.

Please contact McAfee Technical Support if you wish to gain coverage information for any specific POC or samples you ma have on the same.

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Thanks and regards,
Adithyan T
1 Solution

Accepted Solutions
AdithyanT
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 3 of 3

Re: McAfee Coverage for hivenightmare aka serioussam | CVE-2021-36934

Jump to solution

Hi All,

Updated Coverage information, Refernce: https://community.mcafee.com/t5/Endpoint-Security-ENS/McAfee-coverage-for-July-2021-CVE-2021-36934-q...

McAfee is aware of the "HiveNightmare/SeriousSAM" vulnerability, CVE-2021-36934, and is investigating product countermeasures. This article will be updated as we learn more. 

Article Reference here: https://kc.mcafee.com/corporate/index?page=content&id=KB94710

Workaround
Microsoft's Security Response Center recommends restricting access to the contents of %windir%\system32\config\ and deleting any Volume Shadow Copy Service (VSS) shadow copies that were created before restricting access. For more information, see: Microsoft update guide on CVE-2021-36934.

Solution via Expert rule:

Rule Name Block CVE-2021-36934: 'HiveNightmare/SeriousSam'
Severity High
Action
  • Block
  • Report
Rule type Files
Rule content Rule {
    Process {
        Include AggregateMatch -xtype "ex1" {
            Exclude VTP_PRIVILEGES -type BITMASK { -v 0x8 }
        }
        Include AggregateMatch -xtype "ex2" {
            Exclude GROUP_SID { -v "S-1-16-16384" }
            Exclude GROUP_SID { -v "S-1-16-12288" }
        }
        Include AggregateMatch -xtype "ex3" {
            Exclude OBJECT_NAME { -v "vssadmin.exe" }
        }
    }
    Target {
        Match FILE {
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SAM" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SYSTEM" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SOFTWARE" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SECURITY" }
            Include -access "READ"
        }
    }
}

 

Edit: Edited the rule on 24 July 2021 to match the new rule updated on KBA.

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Thanks and regards,
Adithyan T

View solution in original post

2 Replies
AdithyanT
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 2 of 3

Re: McAfee Coverage for hivenightmare aka serioussam | CVE-2021-36934

Jump to solution

Hi All,

This Signature is not applicable to HIPS.

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Thanks and regards,
Adithyan T
AdithyanT
McAfee Employee
McAfee Employee
Report Inappropriate Content
Message 3 of 3

Re: McAfee Coverage for hivenightmare aka serioussam | CVE-2021-36934

Jump to solution

Hi All,

Updated Coverage information, Refernce: https://community.mcafee.com/t5/Endpoint-Security-ENS/McAfee-coverage-for-July-2021-CVE-2021-36934-q...

McAfee is aware of the "HiveNightmare/SeriousSAM" vulnerability, CVE-2021-36934, and is investigating product countermeasures. This article will be updated as we learn more. 

Article Reference here: https://kc.mcafee.com/corporate/index?page=content&id=KB94710

Workaround
Microsoft's Security Response Center recommends restricting access to the contents of %windir%\system32\config\ and deleting any Volume Shadow Copy Service (VSS) shadow copies that were created before restricting access. For more information, see: Microsoft update guide on CVE-2021-36934.

Solution via Expert rule:

Rule Name Block CVE-2021-36934: 'HiveNightmare/SeriousSam'
Severity High
Action
  • Block
  • Report
Rule type Files
Rule content Rule {
    Process {
        Include AggregateMatch -xtype "ex1" {
            Exclude VTP_PRIVILEGES -type BITMASK { -v 0x8 }
        }
        Include AggregateMatch -xtype "ex2" {
            Exclude GROUP_SID { -v "S-1-16-16384" }
            Exclude GROUP_SID { -v "S-1-16-12288" }
        }
        Include AggregateMatch -xtype "ex3" {
            Exclude OBJECT_NAME { -v "vssadmin.exe" }
        }
    }
    Target {
        Match FILE {
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SAM" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SYSTEM" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SOFTWARE" }
            Include OBJECT_NAME { -v "**\\windows\\system32\\config\\SECURITY" }
            Include -access "READ"
        }
    }
}

 

Edit: Edited the rule on 24 July 2021 to match the new rule updated on KBA.

Was my reply helpful?
If you find this post useful, Please give it a Kudos! Also, Please don't forget to select "Accept as a solution" if this reply resolves your query!

Thanks and regards,
Adithyan T

View solution in original post

Community Help Hub

    New to the forums or need help finding your way around the forums? There's a whole hub of community resources to help you.

  • Find Forum FAQs
  • Learn How to Earn Badges
  • Ask for Help
Go to Community Help

Join the Community

    Thousands of customers use the McAfee Community for peer-to-peer and expert product support. Enjoy these benefits with a free membership:

  • Get helpful solutions from McAfee experts.
  • Stay connected to product conversations that matter to you.
  • Participate in product groups led by McAfee employees.
Join the Community
Join the Community