Summary
| Detail | |||
|---|---|---|---|
| Vendor | Symantec | First view | 2014-11-07 |
| Product | Endpoint Protection Manager | Last view | 2020-05-11 |
| Version | 12.1 | Type | Application |
| Update | ru6-mp3 | ||
| Edition | * | ||
| Language | * | ||
| Sofware Edition | * | ||
| Target Software | * | ||
| Target Hardware | * | ||
| Other | * | ||
| CPE Product | cpe:2.3:a:symantec:endpoint_protection_manager | ||
Activity : Overall
Related : CVE
| Date | Alert | Description | |
|---|---|---|---|
| 7 | 2020-05-11 | CVE-2020-5835 | Symantec Endpoint Protection Manager, prior to 14.3, has a race condition in client remote deployment which may result in an elevation of privilege on the remote machine. |
| 5.3 | 2020-05-11 | CVE-2020-5834 | Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to a directory traversal attack that could allow a remote actor to determine the size of files in the directory. |
| 3.3 | 2020-05-11 | CVE-2020-5833 | Symantec Endpoint Protection Manager, prior to 14.3, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program. |
| 3.3 | 2020-02-11 | CVE-2020-5831 | Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program. |
| 3.3 | 2020-02-11 | CVE-2020-5830 | Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program. |
| 3.3 | 2020-02-11 | CVE-2020-5829 | Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program. |
| 3.3 | 2020-02-11 | CVE-2020-5828 | Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program. |
| 3.3 | 2020-02-11 | CVE-2020-5827 | Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program. |
| 7.8 | 2019-11-15 | CVE-2019-12759 | Symantec Endpoint Protection Manager (SEPM) and Symantec Mail Security for MS Exchange (SMSMSE), prior to versions 14.2 RU2 and 7.5.x respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. |
| 7.8 | 2019-11-15 | CVE-2018-18368 | Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU1, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. |
| 7.8 | 2019-04-25 | CVE-2018-18367 | Symantec Endpoint Protection Manager (SEPM) prior to and including 12.1 RU6 MP9 and prior to 14.2 RU1 may be susceptible to a DLL Preloading vulnerability, which is a type of issue that can occur when an application looks to call a DLL for execution and an attacker provides a malicious DLL to use instead. |
| 4.3 | 2016-06-30 | CVE-2016-5307 | Directory traversal vulnerability in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to read arbitrary files in the web-root directory tree via unspecified vectors. |
| 5.3 | 2016-06-30 | CVE-2016-5306 | Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 does not properly implement the HSTS protection mechanism, which makes it easier for remote attackers to obtain sensitive information by sniffing the network for unintended HTTP traffic on port 8445. |
| 5.4 | 2016-06-30 | CVE-2016-5305 | Multiple cross-site scripting (XSS) vulnerabilities in management scripts in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allow remote authenticated users to inject arbitrary web script or HTML via a "DOM link manipulation" attack. |
| 6.8 | 2016-06-30 | CVE-2016-5304 | Open redirect vulnerability in a report-routing component in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to redirect users to arbitrary web sites and conduct phishing attacks via unspecified vectors. |
| 8 | 2016-06-30 | CVE-2016-3653 | Multiple cross-site request forgery (CSRF) vulnerabilities in management scripts in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allow remote authenticated users to hijack the authentication of arbitrary users. |
| 5.4 | 2016-06-30 | CVE-2016-3652 | Multiple cross-site scripting (XSS) vulnerabilities in management scripts in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allow remote authenticated users to inject arbitrary web script or HTML via unspecified vectors. |
| 8 | 2016-06-30 | CVE-2016-3651 | Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to discover the PHP JSESSIONID value via unspecified vectors. |
| 8.8 | 2016-06-30 | CVE-2016-3650 | Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to discover credentials via a brute-force attack. |
| 4.3 | 2016-06-30 | CVE-2016-3649 | Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated administrators to enumerate administrator accounts via modified GET requests. |
| 8.8 | 2016-06-30 | CVE-2016-3648 | Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to bypass the Authentication Lock protection mechanism, and conduct brute-force password-guessing attacks against management-console accounts, by entering data into the authorization window. |
| 7.7 | 2016-06-30 | CVE-2016-3647 | Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks, and trigger network traffic to arbitrary intranet hosts, via a crafted request. |
| 2.9 | 2016-06-30 | CVE-2015-8801 | Race condition in the client in Symantec Endpoint Protection (SEP) 12.1 before RU6 MP5 allows local users to bypass intended restrictions on USB file transfer by conducting filesystem operations before the SEP device manager recognizes a new USB device. |
| 8.8 | 2016-03-18 | CVE-2015-8154 | The SysPlant.sys driver in the Application and Device Control (ADC) component in the client in Symantec Endpoint Protection (SEP) 12.1 before RU6-MP4 allows remote attackers to execute arbitrary code via a crafted HTML document, related to "RWX Permissions." |
| 8.8 | 2016-03-18 | CVE-2015-8153 | SQL injection vulnerability in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6-MP4 allows remote authenticated users to execute arbitrary SQL commands via unspecified vectors. |
CWE : Common Weakness Enumeration
| % | id | Name |
|---|---|---|
| 20% (6) | CWE-125 | Out-of-bounds Read |
| 16% (5) | CWE-200 | Information Exposure |
| 13% (4) | CWE-254 | Security Features |
| 10% (3) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
| 6% (2) | CWE-352 | Cross-Site Request Forgery (CSRF) |
| 6% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
| 3% (1) | CWE-426 | Untrusted Search Path |
| 3% (1) | CWE-362 | Race Condition |
| 3% (1) | CWE-284 | Access Control (Authorization) Issues |
| 3% (1) | CWE-269 | Improper Privilege Management |
| 3% (1) | CWE-264 | Permissions, Privileges, and Access Controls |
| 3% (1) | CWE-94 | Failure to Control Generation of Code ('Code Injection') |
| 3% (1) | CWE-89 | Improper Sanitization of Special Elements used in an SQL Command ('... |
| 3% (1) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
ExploitDB Exploits
| id | Description |
|---|---|
| 35181 | Symantec Endpoint Protection 12.1.4023.4080 - Multiple Vulnerabilities |
Snort® IPS/IDS
| Date | Description |
|---|---|
| 2019-09-17 | Symantec Endpoint Protection cross site scripting attempt RuleID : 51032 - Type : SERVER-WEBAPP - Revision : 2 |
| 2019-09-17 | Symantec Endpoint Protection cross site scripting attempt RuleID : 51031 - Type : SERVER-WEBAPP - Revision : 2 |
| 2018-02-06 | Symantec Endpoint Protection cross site scripting attempt RuleID : 45381 - Type : SERVER-WEBAPP - Revision : 2 |
| 2017-11-28 | SERVER-WEBAPP Symantec Endpoint Protection Manager authentication lock bypass... RuleID : 44641 - Type : POLICY-OTHER - Revision : 2 |
| 2017-11-07 | Symantec Endpoint Protection Manager information disclosure attempt RuleID : 44507 - Type : SERVER-WEBAPP - Revision : 2 |
| 2017-11-07 | Symantec Endpoint Protection Manager directory traversal attempt RuleID : 44506 - Type : SERVER-WEBAPP - Revision : 2 |
| 2017-11-07 | Symantec Endpoint Protection Manager directory traversal attempt RuleID : 44505 - Type : SERVER-WEBAPP - Revision : 2 |
| 2017-11-07 | Symantec Endpoint Protection Manager directory traversal attempt RuleID : 44504 - Type : SERVER-WEBAPP - Revision : 2 |
| 2017-08-31 | Symantec SEPM management console cross site scripting attempt RuleID : 43793 - Type : SERVER-WEBAPP - Revision : 1 |
| 2016-08-02 | Symantec Endpoint Protection Manager cross site request forgery attempt RuleID : 39405 - Type : SERVER-OTHER - Revision : 2 |
| 2016-08-02 | Symantec Endpoint Protection Manager cross site request forgery attempt RuleID : 39404 - Type : SERVER-OTHER - Revision : 2 |
| 2016-08-02 | Symantec open redirect in external URL .php script attempt RuleID : 39399 - Type : SERVER-WEBAPP - Revision : 3 |
| 2016-08-02 | Symantec SEPM management console cross site scripting attempt RuleID : 39398 - Type : SERVER-WEBAPP - Revision : 3 |
Nessus® Vulnerability Scanner
| id | Description |
|---|---|
| 2016-06-30 | Name: The version of Symantec Endpoint Protection Manager installed on the remote h... File: symantec_endpoint_prot_mgr_sym16-011.nasl - Type: ACT_GATHER_INFO |
| 2016-03-25 | Name: The version of Symantec Endpoint Protection Client installed on the remote ho... File: symantec_endpoint_prot_client_sym16-003.nasl - Type: ACT_GATHER_INFO |
| 2016-03-25 | Name: The version of Symantec Endpoint Protection Manager installed on the remote h... File: symantec_endpoint_prot_mgr_sym16-003.nasl - Type: ACT_GATHER_INFO |
| 2015-12-18 | Name: An application running on the remote host is affected by an arbitrary command... File: symantec_endpoint_prot_mgr_2015_6554.nasl - Type: ACT_ATTACK |
| 2015-11-13 | Name: The version of Symantec Endpoint Protection Manager installed on the remote h... File: symantec_endpoint_prot_mgr_sym15-011.nasl - Type: ACT_GATHER_INFO |
| 2014-11-10 | Name: The version of Symantec Endpoint Protection Manager installed on the remote h... File: symantec_endpoint_prot_mgr_sym14-015.nasl - Type: ACT_GATHER_INFO |










