![]() ![]() With this feature disabled (we have seen various environments with this disabled or tuned down), exploitability of the vulnerability is high. It is my stance that this is a vulnerability regardless if Tamper Protection is enabled or not. ![]() Tamper protection being disabled in massive organizations is a common thing that is observed. In order for this vulnerability to be reliably exploited, Symantec Endpoint Protection’s “Tamper Protection” feature needs to be disabled. This vulnerability was found in conjunction with Marcus Sailler, Rick Romo and Gary Muller of Capital Group’s Security Testing Team Symantec Endpoint Protection Version: 14.2 RU1 Build 3335 (.1000) and below Operating System Tested On: Wind圆4 CVE-2019–12757: Local Privilege Escalation in Symantec Endpoint Protection ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |