First published: Tue Feb 11 2020(Updated: )
Symantec Endpoint Protection Manager (SEPM), prior to 14.2 RU2 MP1, may be susceptible to an out of bounds vulnerability, which is a type of issue that results in an existing application reading memory outside of the bounds of the memory that had been allocated to the program.
Credit: secure@symantec.com
Affected Software | Affected Version | How to fix |
---|---|---|
Symantec Endpoint Protection Manager | <14.2 | |
Symantec Endpoint Protection Manager | =14.2 | |
Symantec Endpoint Protection Manager | =14.2-mp1 | |
Symantec Endpoint Protection Manager | =14.2-ru1 | |
Symantec Endpoint Protection Manager | =14.2-ru1-mp1 | |
Symantec Endpoint Protection Manager | =14.2-ru2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-5831 is an out of bounds vulnerability in Symantec Endpoint Protection Manager (SEPM) prior to 14.2 RU2 MP1.
The affected software is Symantec Endpoint Protection Manager (SEPM) versions prior to 14.2 RU2 MP1.
The severity of CVE-2020-5831 is low, with a severity score of 3.3.
CVE-2020-5831 allows an existing application to read memory outside of the bounds of the allocated memory, potentially leading to unauthorized access to sensitive information or remote code execution.
To mitigate the risk of CVE-2020-5831, it is recommended to update Symantec Endpoint Protection Manager (SEPM) to version 14.2 RU2 MP1 or later.