First published: Thu Jun 30 2016(Updated: )
Directory traversal vulnerability in Symantec Endpoint Protection Manager (SEPM) 12.1 before RU6 MP5 allows remote authenticated users to read arbitrary files in the web-root directory tree via unspecified vectors.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Endpoint Protection | <=12.1.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5307 is classified as a medium severity vulnerability due to its potential to allow remote authenticated users to read arbitrary files.
To mitigate CVE-2016-5307, upgrade to Symantec Endpoint Protection Manager version 12.1 RU6 MP5 or later.
CVE-2016-5307 affects Symantec Endpoint Protection Manager versions prior to RU6 MP5.
CVE-2016-5307 is a directory traversal vulnerability that can be exploited through specific vectors.
No, CVE-2016-5307 requires remote authenticated users to exploit the vulnerability.