CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
---|---|---|
4.6 | $0-$5k | 0.00 |
A vulnerability was found in Symantec Endpoint Protection and Endpoint Protection Small Business Edition up to 14.2 RU2 (Anti-Malware Software). It has been declared as problematic. Affected by this vulnerability is an unknown functionality. The manipulation with an unknown input leads to a denial of service vulnerability. The CWE definition for the vulnerability is CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. As an impact it is known to affect availability. The summary by CVE is:
Symantec Endpoint Protection (SEP) and Symantec Endpoint Protection Small Business Edition (SEP SBE), prior to 14.2 RU2 MP1 and prior to 14.2.5569.2100 respectively, may be susceptible to a denial of service vulnerability, which is a type of issue whereby a threat actor attempts to tie up the resources of a resident application, thereby making certain functions unavailable.
The weakness was presented 02/03/2020 as SYMSA1505 as confirmed security advisory (Website). It is possible to read the advisory at support.symantec.com. This vulnerability is known as CVE-2020-5824 since 01/06/2020. Attacking locally is a requirement. The successful exploitation needs a single authentication. The technical details are unknown and an exploit is not publicly available.
Upgrading to version 14.2 RU2 MP1 or 14.2.5569.2100 eliminates this vulnerability. A possible mitigation has been published immediately after the disclosure of the vulnerability.
See 149979, 149980, 149981 and 149982 for similar entries.
Product
Type
Vendor
Name
Version
License
CPE 2.3
CPE 2.2
CVSSv4
VulDB CVSS-B Score: 🔍VulDB CVSS-BT Score: 🔍
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 4.8VulDB Meta Temp Score: 4.7
VulDB Base Score: 3.3
VulDB Temp Score: 3.2
VulDB Vector: 🔍
VulDB Reliability: 🔍
Vendor Base Score (Symantec): 5.5
Vendor Vector (Symantec): 🔍
NVD Base Score: 5.5
NVD Vector: 🔍
CVSSv2
AV | AC | Au | C | I | A |
---|---|---|---|---|---|
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
---|---|---|---|---|---|
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
unlock | unlock | unlock | unlock | unlock | unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
ATT&CK: Unknown
Local: Yes
Remote: No
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
0-Day | unlock | unlock | unlock | unlock |
---|---|---|---|---|
Today | unlock | unlock | unlock | unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
Reaction Time: 🔍
0-Day Time: 🔍
Exposure Time: 🔍
Upgrade: Endpoint Protection/Endpoint Protection Small Business Edition 14.2 RU2 MP1/14.2.5569.2100
Timeline
01/06/2020 🔍02/03/2020 🔍
02/03/2020 🔍
02/12/2020 🔍
02/12/2020 🔍
Sources
Vendor: symantec.comAdvisory: SYMSA1505
Status: Confirmed
CVE: CVE-2020-5824 (🔍)
See also: 🔍
Entry
Created: 02/12/2020 07:40Updated: 02/12/2020 07:45
Changes: 02/12/2020 07:40 (53), 02/12/2020 07:45 (19)
Complete: 🔍
No comments yet. Languages: en.
Please log in to comment.