{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-04-17T20:04:44.559","vulnerabilities":[{"cve":{"id":"CVE-2022-1824","sourceIdentifier":"trellixpsirt@trellix.com","published":"2022-06-20T11:15:09.857","lastModified":"2024-11-21T06:41:33.100","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"An uncontrolled search path vulnerability in McAfee Consumer Product Removal Tool prior to version 10.4.128 could allow a local attacker to perform a sideloading attack by using a specific file name. This could result in the user gaining elevated permissions and being able to execute arbitrary code as there were insufficient checks on the executable being signed by McAfee."},{"lang":"es","value":"Una vulnerabilidad de ruta de búsqueda no controlada en McAfee Consumer Product Removal Tool versiones anteriores a 10.4.128, podría permitir a un atacante local llevar a cabo un ataque de sideloading usando un nombre de archivo específico. Esto podría resultar en que el usuario obtuviera permisos elevados y pudiera ejecutar código arbitrario, ya que no había suficientes comprobaciones sobre el ejecutable firmado por McAfee"}],"metrics":{"cvssMetricV31":[{"source":"trellixpsirt@trellix.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:N/I:H/A:H","baseScore":7.9,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"NONE","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":5.8},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H","baseScore":8.2,"baseSeverity":"HIGH","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"REQUIRED","scope":"CHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH"},"exploitabilityScore":1.5,"impactScore":6.0}],"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:L/AC:M/Au:N/C:P/I:P/A:P","baseScore":4.4,"accessVector":"LOCAL","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":3.4,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"weaknesses":[{"source":"trellixpsirt@trellix.com","type":"Secondary","description":[{"lang":"en","value":"CWE-427"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-427"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:mcafee:consumer_product_removal_tool:*:*:*:*:*:*:*:*","versionEndExcluding":"10.4.128","matchCriteriaId":"ED73DBAF-E38E-40CB-BD9D-0073323F89EA"}]}]}],"references":[{"url":"https://service.mcafee.com/?articleId=TS103318&page=shell&shell=article-view","source":"trellixpsirt@trellix.com","tags":["Vendor Advisory"]},{"url":"https://service.mcafee.com/?articleId=TS103318&page=shell&shell=article-view","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]}]}}]}