Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-5822

Опубликовано: 11 фев. 2020
Источник: nvd
CVSS3: 7.8
CVSS2: 4.6
EPSS Низкий

Описание

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:symantec:endpoint_protection:11.0:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr4:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr4-mp1a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:mr4-mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru1-p1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru2-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1b:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4a:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru5:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp3:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp4:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp5:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp6:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp7:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp8:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp9:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.0:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.0:mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.0:mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.1:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp2:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:-:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:ru1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:ru1_mp1:*:*:*:*:*:*
cpe:2.3:a:symantec:endpoint_protection:14.2:ru2:*:*:*:*:*:*
Конфигурация 2

Одно из

cpe:2.3:a:symantec:endpoint_protection:12.0:rtm:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.0:ru1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:-:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru1-mp1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru2:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru2-mp1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru3:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1a:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1b:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru4a:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru5:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp1:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp10:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp2:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp3:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp4:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp5:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp6:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp7:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp8:*:*:small_business:*:*:*
cpe:2.3:a:symantec:endpoint_protection:12.1:ru6_mp9:*:*:small_business:*:*:*

EPSS

Процентиль: 22%
0.00072
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

NVD-CWE-noinfo

Связанные уязвимости

github
больше 3 лет назад

Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

EPSS

Процентиль: 22%
0.00072
Низкий

7.8 High

CVSS3

4.6 Medium

CVSS2

Дефекты

NVD-CWE-noinfo