{"id":13166,"date":"2020-02-14T11:53:05","date_gmt":"2020-02-14T10:53:05","guid":{"rendered":"http:\/\/159.69.82.204\/win\/?p=13166"},"modified":"2022-02-08T12:29:17","modified_gmt":"2022-02-08T11:29:17","slug":"security-update-for-symantec-endpoint-protection","status":"publish","type":"post","link":"https:\/\/borncity.com\/win\/2020\/02\/14\/security-update-for-symantec-endpoint-protection\/","title":{"rendered":"Security Update for Symantec Endpoint Protection"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" style=\"float: left; margin: 0px 10px 0px 0px; display: inline\" src=\"https:\/\/www.borncity.com\/blog\/wp-content\/uploads\/2015\/01\/Schutz.jpg\" width=\"40\" align=\"left\" height=\"47\">[<a href=\"https:\/\/www.borncity.com\/blog\/2020\/02\/14\/symantec-endpoint-protection-dringend-updaten\/\" target=\"_blank\" rel=\"noopener noreferrer\">German<\/a>]If someone is using Symantec Endpoint Protection on their Windows clients, the antivirus solution should be updated quickly. This is because older versions have critical security vulnerabilities.<\/p>\n<p><!--more--><\/p>\n<p>Symantec issued this <a href=\"https:\/\/web.archive.org\/web\/20200213171435\/https:\/\/support.symantec.com\/us\/en\/article.SYMSA1505.html\" target=\"_blank\" rel=\"noopener noreferrer\">security warning<\/a> on February 3, 2020, but updated the document on February 10, 2020. In the products: <\/p>\n<ul>\n<li>Symantec Endpoint Protection (SEP), before 14.2 RU2 MP1 (14.2.5569.2100)\n<li>Symantec Endpoint Protection Manager (SEPM), before 14.2 RU2 MP1\n<li>and Symantec Endpoint Protection Small Business Edition (SEP SBE) <\/li>\n<\/ul>\n<p>vulnerabilities were discovered (mostly by the Trend Micro Zero Day Initiative), which were rated as high (score 7.8) Attackers may be able to use security holes to gain increased rights or carry out DoS attacks. Symantec is not currently aware of any exploits or negative impact of these issues on customers.&nbsp; <\/p>\n<ul>\n<li>Symantec Endpoint Protection (SEP): CVE-2020-5820, CVE-2020-5821, CVE-2020-5822, CVE-2020-5823, CVE-2020-5824, CVE-2020-5825, CVE-2020-5826\n<li>Symantec Endpoint Protection Manager (SEPM): CVE-2020-5827, CVE-2020-5828, CVE-2020-5829, CVE-2020-5830, CVE-2020-5831<\/li>\n<\/ul>\n<p>Details of the respective vulnerabilities such as the Privilege Escalation Vulnerability <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5820\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-5820<\/a>, or <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5821\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-5821<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5822\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-5822<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5823\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-5823<\/a>, <a href=\"https:\/\/nvd.nist.gov\/vuln\/detail\/CVE-2020-5824\" target=\"_blank\" rel=\"noopener noreferrer\">CVE-2020-5824<\/a> etc. can be found in <a href=\"https:\/\/web.archive.org\/web\/20200213171435\/https:\/\/support.symantec.com\/us\/en\/article.SYMSA1505.html\" target=\"_blank\" rel=\"noopener noreferrer\">the Symantec article here<\/a>. Symantec has now released updates for the following to address the above vulnerabilities.<\/p>\n<ul>\n<li>SEP 14.2 RU2 MP1 (14.2.5569.2100)\n<li>SEPM 14.2 RU2 MP1\n<li>SEP SBE 14.2 RU2 MP1 (14.2.5569.2100)<\/li>\n<\/ul>\n<p>Symantec has also implemented additional detection and protection measures and continues to monitor all attempts to exploit this in its products. There is currently no evidence of attempts to exploit this vulnerability in the wild. (<a href=\"https:\/\/www.heise.de\/security\/meldung\/Sicherheitsupdates-Symantec-Endpoint-Protection-vielfaeltig-angreifbar-4659864.html\" target=\"_blank\" rel=\"noopener noreferrer\">via<\/a>)<\/p>\n","protected":false},"excerpt":{"rendered":"<p>[German]If someone is using Symantec Endpoint Protection on their Windows clients, the antivirus solution should be updated quickly. This is because older versions have critical security vulnerabilities.<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[580,1547,22],"tags":[646,69,2078,195],"class_list":["post-13166","post","type-post","status-publish","format-standard","hentry","category-security","category-software","category-update","tag-antivirus","tag-security","tag-symantec","tag-update"],"_links":{"self":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13166","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/comments?post=13166"}],"version-history":[{"count":0,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/posts\/13166\/revisions"}],"wp:attachment":[{"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/media?parent=13166"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/categories?post=13166"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/borncity.com\/win\/wp-json\/wp\/v2\/tags?post=13166"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}