Code White found several vulnerabilities in Symantec Endpoint Protection (SEP), affecting versions 12.1 prior to 12.1 RU6 MP1. SEP Manager (SEPM): * CVE-2015-1486: Authentication Bypass * CVE-2015-1487: Arbitrary File Write * CVE-2015-1488: Arbitrary File Read * CVE-2015-1489: Privilege Escalation * CVE-2015-1490: Path Traversal * CVE-2015-1491: SQL Injection SEP clients: * CVE-2015-1492: Binary Planting Official Symantec advisory SYM15-007: https://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20150730_00 An exploitation of these vulnerabilities effectively allow an unauthenticated remote attacker the full compromise of both the SEPM server as well as SEP clients running Windows. This can result in a full compromise of an enterprise Windows domain. Symantec provided the update 12.1 RU6 MP1 to address the issues. For a full disclosure of some of the vulnerabilities, see: http://codewhitesec.blogspot.com/2015/07/symantec-endpoint-protection.html -- Markus Wulftange Senior Penetration Tester Code White GmbH Magirus-Deutz-Straße 18 89077 Ulm E-Mail markus.wulftange@code-white.com PGP C6D6 C18B BAB9 0089 6942 213D 7772 8552 E9F8 6F39 http://www.code-white.com Code White GmbH Sitz und Registergericht/Domicile and Register Court: Stuttgart, HRB-Nr./Commercial Register No.: 749152 Geschäftsführung/Management: Dr. Helmut Mahler, Andreas Melzner, Lüder Sachse