FKIE_CVE-2019-12756
Vulnerability from fkie_nvd - Published: 2019-11-15 17:15 - Updated: 2024-11-21 04:23
Severity ?
Summary
Symantec Endpoint Protection (SEP), prior to 14.2 RU2 may be susceptible to a password protection bypass vulnerability whereby the secondary layer of password protection could by bypassed for individuals with local administrator rights.
References
| URL | Tags | ||
|---|---|---|---|
| secure@symantec.com | https://support.symantec.com/us/en/article.SYMSA1488.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://support.symantec.com/us/en/article.SYMSA1488.html | Patch, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:-:*:*:*:*:*:*",
"matchCriteriaId": "FF3B36FF-5C26-4565-A23A-789D1158B867",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:mr1:*:*:*:*:*:*",
"matchCriteriaId": "C5DCB89C-80FD-45FE-AD93-6192A53B7563",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:mr2:*:*:*:*:*:*",
"matchCriteriaId": "06401D10-3664-4070-B2DB-232474264D81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:mr3:*:*:*:*:*:*",
"matchCriteriaId": "2AD1793E-2D25-41F4-9E99-D0FC7A4F1551",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:mr4:*:*:*:*:*:*",
"matchCriteriaId": "924E3111-CF09-43A8-96C9-A617FD839897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:mr4-mp1a:*:*:*:*:*:*",
"matchCriteriaId": "922A551D-0624-422F-ABB7-44168A985D4A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:mr4-mp2:*:*:*:*:*:*",
"matchCriteriaId": "89252C37-555E-4B73-95B5-6D8827F679CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:*:*:*",
"matchCriteriaId": "F9E055CC-55A9-4F52-BBC5-53126A581D76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:*:*:*",
"matchCriteriaId": "A1DD0DB8-3108-4A6C-83D4-D1DA9CB1B51F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp1:*:*:*:*:*:*",
"matchCriteriaId": "0E19B9F1-DDD6-40F0-840C-575DEDCB7416",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp2:*:*:*:*:*:*",
"matchCriteriaId": "C06118E9-B6F8-4DDD-A28F-09FF69C82067",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp3:*:*:*:*:*:*",
"matchCriteriaId": "2FEAD5EE-45BB-4E9C-948D-1B8D695DDF82",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:*:*:*",
"matchCriteriaId": "435109B2-F971-4059-8E5C-76C53A161836",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7:*:*:*:*:*:*",
"matchCriteriaId": "104B1371-BE9C-45F6-9579-0AA9B4097980",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp1:*:*:*:*:*:*",
"matchCriteriaId": "B5A7BFF4-D70C-44B2-BF64-CD655CC7EFCA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp2:*:*:*:*:*:*",
"matchCriteriaId": "93A60260-E495-448B-91CA-026E696A67EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp3:*:*:*:*:*:*",
"matchCriteriaId": "D2AA1BA0-F242-4E4E-BE52-003C5617D6DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4:*:*:*:*:*:*",
"matchCriteriaId": "323F32E0-82FD-4F96-9CED-90D67AFE15FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4a:*:*:*:*:*:*",
"matchCriteriaId": "6E8B19CE-8C63-4EEB-A6B8-CC46A7CE15F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:-:*:*:*:*:*:*",
"matchCriteriaId": "BD54A6EB-AA9A-4AEF-901A-8108672A0E0A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru1:*:*:*:*:*:*",
"matchCriteriaId": "2CB77AE7-55B2-40DC-B860-6AF02E3C1BB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru1-p1:*:*:*:*:*:*",
"matchCriteriaId": "853104E0-92B7-4414-8912-0D8CDBBCF905",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru2:*:*:*:*:*:*",
"matchCriteriaId": "A957A7B6-D107-4784-8948-52317B3552BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru2-mp1:*:*:*:*:*:*",
"matchCriteriaId": "E21ED16B-35C3-4754-94D8-C57F18CC9CDC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru3:*:*:*:*:*:*",
"matchCriteriaId": "1F4C3A3A-9D7D-4AFB-B256-99102468843A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4:*:*:*:*:*:*",
"matchCriteriaId": "6C1C08C5-4598-42C1-AEDE-EE85D8457175",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1:*:*:*:*:*:*",
"matchCriteriaId": "66499F19-33EE-4280-9C47-9ECA04EDED1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1a:*:*:*:*:*:*",
"matchCriteriaId": "640E8481-AB57-470E-BFDC-6DD70A79337B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1b:*:*:*:*:*:*",
"matchCriteriaId": "95E7B32C-6614-44A7-AE9E-4F0D7EBE3559",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru4a:*:*:*:*:*:*",
"matchCriteriaId": "1456573A-17DA-4EC5-A7B6-2371574336B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru5:*:*:*:*:*:*",
"matchCriteriaId": "31E46D5C-65C9-4D36-B230-F3F519C36015",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6:*:*:*:*:*:*",
"matchCriteriaId": "A72E7D67-F3BD-404A-B9CB-6241AAE1D6F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp1:*:*:*:*:*:*",
"matchCriteriaId": "1FB729C3-FECA-4CA1-8504-7A627EA34219",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp2:*:*:*:*:*:*",
"matchCriteriaId": "8F8781A1-AFF1-4F00-9951-D2EE57F423F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp3:*:*:*:*:*:*",
"matchCriteriaId": "5C8CC48B-A8BA-471D-8D32-F778F7C29C7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp4:*:*:*:*:*:*",
"matchCriteriaId": "25552D01-9EB4-4DEA-A8FE-618BB01FDDAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp5:*:*:*:*:*:*",
"matchCriteriaId": "DB283B1A-D3EC-46A6-893F-98F73D325C87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp6:*:*:*:*:*:*",
"matchCriteriaId": "9E0E94AA-26D9-4B14-8C12-ADD7BA262DB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp7:*:*:*:*:*:*",
"matchCriteriaId": "0B8B7847-FCF6-4A46-B515-CE7E5489E1E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp8:*:*:*:*:*:*",
"matchCriteriaId": "FE626FA0-B277-4C6D-B2E9-A3DDD31D0E61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp9:*:*:*:*:*:*",
"matchCriteriaId": "AE01DAE4-7B10-4A1C-9401-769A1E72EBCB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "C0592370-C2A7-459C-9A0D-16D180D1FA59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.0.0:mp1:*:*:*:*:*:*",
"matchCriteriaId": "E8D921D0-9739-4A1D-82BC-7DC6C71BCBEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.0.0:mp2:*:*:*:*:*:*",
"matchCriteriaId": "19F9E1C6-D313-405C-BB84-59101D76897B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.0.1:-:*:*:*:*:*:*",
"matchCriteriaId": "7D5D05E3-D07F-495F-AF55-C6F43EA43524",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp1:*:*:*:*:*:*",
"matchCriteriaId": "33856A4A-9208-4197-A3CA-42BEC64113A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp2:*:*:*:*:*:*",
"matchCriteriaId": "DEA0F4D4-EF6A-49F9-A1ED-51F654159E84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.2:-:*:*:*:*:*:*",
"matchCriteriaId": "EC76BE02-C247-4929-8C0F-D3931E34E59C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.2:mp1:*:*:*:*:*:*",
"matchCriteriaId": "8B72B183-77B9-4C71-9851-5C370291B575",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:symantec:endpoint_protection:14.2:ru1:*:*:*:*:*:*",
"matchCriteriaId": "C1DD3F0E-48D3-46E8-9A01-6EC4D7B3A4E2",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "Symantec Endpoint Protection (SEP), prior to 14.2 RU2 may be susceptible to a password protection bypass vulnerability whereby the secondary layer of password protection could by bypassed for individuals with local administrator rights."
},
{
"lang": "es",
"value": "Symantec Endpoint Protection (SEP), versiones anteriores a la versi\u00f3n 14.2 RU2, puede ser susceptible a una vulnerabilidad de omisi\u00f3n de protecci\u00f3n de contrase\u00f1a por la cual la capa secundaria de protecci\u00f3n de contrase\u00f1a podr\u00eda ser omitida para individuos con derechos de administrador local."
}
],
"id": "CVE-2019-12756",
"lastModified": "2024-11-21T04:23:30.503",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "LOW",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "LOCAL",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 2.1,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:L/AC:L/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 3.9,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "LOCAL",
"availabilityImpact": "NONE",
"baseScore": 2.3,
"baseSeverity": "LOW",
"confidentialityImpact": "NONE",
"integrityImpact": "LOW",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"exploitabilityScore": 0.8,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2019-11-15T17:15:13.213",
"references": [
{
"source": "secure@symantec.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.symantec.com/us/en/article.SYMSA1488.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://support.symantec.com/us/en/article.SYMSA1488.html"
}
],
"sourceIdentifier": "secure@symantec.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "NVD-CWE-noinfo"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…