
Cloud Vulnerability DB
A community-led vulnerabilities database
Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to versions 14.2 RU2 MP1 and 14.2.5569.2100 respectively, were identified with a privilege escalation vulnerability (CVE-2020-5823). The vulnerability was discovered by researcher Z0mb1E working with Trend Micro Zero Day Initiative and was publicly disclosed on February 11, 2020 (NVD, ZDI).
The vulnerability exists within the ccJobMgr.dll module of Symantec Endpoint Protection. By invoking a method of a COM class, an attacker can launch an arbitrary executable. The vulnerability has been assigned a CVSS v3.1 base score of 7.8 (High) with the vector string CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H (NVD, Broadcom).
If successfully exploited, this vulnerability allows an attacker to escalate privileges and execute arbitrary code in the context of SYSTEM, potentially gaining elevated access to resources that are normally protected from an application or user (ZDI).
Symantec released version 14.2 RU2 MP1 (14.2.5569.2100) to address this vulnerability. Additionally, a refresh of 14.2 RU2 (14.2.5334.2000) was released on February 10, 2020. The vendor recommends restricting access to administrative systems, running under the principle of least privilege, keeping systems current with vendor patches, and implementing a multi-layered security approach (Broadcom).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."