### [CVE-2021-31841](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-31841) ![](https://img.shields.io/static/v1?label=Product&message=McAfee%20Agent%20for%20Windows&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3C%205.7.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-347%3A%20Improper%20Verification%20of%20Cryptographic%20Signature%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-426%3A%20Untrusted%20Search%20Path&color=brighgreen) ### Description A DLL sideloading vulnerability in McAfee Agent for Windows prior to 5.7.4 could allow a local user to perform a DLL sideloading attack with an unsigned DLL with a specific name and in a specific location. This would result in the user gaining elevated permissions and the ability to execute arbitrary code as the system user, through not checking the DLL signature. ### POC #### Reference - https://kc.mcafee.com/corporate/index?page=content&id=SB10369 #### Github No PoCs found on GitHub currently.