First published: Thu Jun 30 2016(Updated: )
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to conduct server-side request forgery (SSRF) attacks, and trigger network traffic to arbitrary intranet hosts, via a crafted request.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Endpoint Protection | <=12.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-3647 has a moderate severity rating, as it allows remote authenticated users to conduct SSRF attacks.
To fix CVE-2016-3647, ensure you update Symantec Endpoint Protection Manager to version 12.1 RU6 MP5 or later.
CVE-2016-3647 affects Symantec Endpoint Protection Manager versions prior to RU6 MP5.
CVE-2016-3647 can be exploited to perform server-side request forgery (SSRF) attacks.
CVE-2016-3647 can lead to unauthorized access to intranet hosts and potentially expose sensitive internal resources.