First published: Sat May 14 2016(Updated: )
Unquoted Windows search path vulnerability in EEDService in Symantec Endpoint Encryption (SEE) 11.x before 11.1.1 allows local users to gain privileges via a Trojan horse executable file in the %SYSTEMDRIVE% directory, as demonstrated by program.exe.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Endpoint Encryption | =11.0 | |
Symantec Endpoint Encryption | =11.0.0 | |
Symantec Endpoint Encryption | =11.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2015-8156 is rated as a high-severity vulnerability that allows local users to gain elevated privileges.
To fix CVE-2015-8156, update Symantec Endpoint Encryption to version 11.1.1 or later which addresses this vulnerability.
CVE-2015-8156 affects Symantec Endpoint Encryption versions 11.0, 11.0.0, and 11.0.1.
Yes, CVE-2015-8156 can be exploited locally by a user placing a Trojan horse executable in the %SYSTEMDRIVE% directory.
There is no official workaround for CVE-2015-8156; the recommended action is to apply the latest security update.