Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-12757

Опубликовано: 15 нояб. 2019
Источник: nvd
CVSS3: 7.8
CVSS2: 4.6
EPSS Низкий

Описание

Symantec Endpoint Protection (SEP), prior to 14.2 RU2 & 12.1 RU6 MP10 and Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to 12.1 RU6 MP10d (12.1.7510.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:symantec:endpoint_protection:11.0:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr4:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr4-mp1a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr4-mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru1-p1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru2-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1b:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru5:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp4:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp5:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp6:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp7:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp8:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp9:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.0:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.0:mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.0:mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.1:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:ru1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:ru1_mp1:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:symantec:endpoint_protection:12.0:rtm:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.0:ru1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:-:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru1-mp1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru2:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru2-mp1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru3:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1a:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1b:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4a:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru5:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp10:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp2:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp3:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp4:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp5:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp6:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp7:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp8:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp9:*:*:small_business:*:*:*

EPSS

Процентиль: 22%
0.00072
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

github
больше 3 лет назад

Symantec Endpoint Protection (SEP), prior to 14.2 RU2 & 12.1 RU6 MP10 and Symantec Endpoint Protection Small Business Edition (SEP SBE) prior to 12.1 RU6 MP10d (12.1.7510.7002), may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

EPSS

Процентиль: 22%
0.00072
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

NVD-CWE-noinfo