First published: Thu Jun 30 2016(Updated: )
Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to bypass the Authentication Lock protection mechanism, and conduct brute-force password-guessing attacks against management-console accounts, by entering data into the authorization window.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Endpoint Protection | <=12.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2016-3648 is classified as medium, due to its potential for unauthorized access.
To fix CVE-2016-3648, upgrade Symantec Endpoint Protection Manager to version 12.1 RU6 MP5 or later.
CVE-2016-3648 affects users of Symantec Endpoint Protection Manager version 12.1 prior to RU6 MP5.
CVE-2016-3648 allows remote authenticated users to bypass authentication mechanisms and perform brute-force password attacks.
CVE-2016-3648 is a vulnerability related to improper authorization and authentication bypass in Symantec Endpoint Protection Manager.