Symantec endpoint zero-day unpatched for months

Danielx64

Level 10
Thread author
Verified
Well-known
Mar 24, 2017
481
A vulnerability in Symantec endpoint clients remains unpatched months after disclosure, according to security researchers.
A vulnerability in Symantec endpoint clients remains unpatched months after disclosure, according to security researchers.

The zero-day bug affects a kernel driver in two Symantec products, Symantec Encryption Desktop suite version 10.4.1 MP2HF1 (Build 777) and earlier, module PGPwded.sys and Symantec Endpoint Encryption version v11.1.3 MP1 (Build 810) and earlier, module eedDiskEncryptionDriver.sys.

The vulnerability allows an attacker to attain arbitrary hard disk read and write access at sector level, and subsequently infect the target and gain low level persistence (MBR/VBR). They also allow the attacker to execute code in the context of the built-in SYSTEM user account, without requiring a reboot.

Not sure how many of you use those products but I thought that I would share this. Not good to hear about this from a security business.
 
Last edited:
D

Deleted member 65228

Those vulnerabilities aren't your average small-time ones, they are quite critical and if abused can cause severe damage. Exploitation of those vulnerabilities could provide an attacker with the opportunity to install a Volume Boot Record based bootkit on the system whilst surpassing Symantec protection and masking the offender due to using Symantec components to perform the operation (strengthening anti-forensics should any real-time logging be going on and monitored by the analysts at the targeted enterprise).

Symantec should have assigned employees to have these vulnerabilities resolved ASAP from the minute they had finished reading the vulnerability submission report, and since it was disclosed by a/multiple security researchers, I should hope that they were rewarded a nice bug bounty for their hard-work and patience... Hopefully a big one considering the damage potential as well as both the submissions being critical.

It is disappointing to hear that it took months after disclosure for something critical like that.
 
D

Deleted member 65228

I'm starting to question if SEPM/SEP is providing the protection that I would think they are. Or rather if any other Symantec products have security issues like this lurking.
The good news is that it was identified by security researchers and not black-hat hackers who have malicious intent and would happily abuse a vulnerability like the ones mentioned above to gain profit illegally. Better late than never eh!

It really is a shame though, I cannot say I'm not disappointed. I think they should have had it on high priority to fix those vulnerabilities ASAP, not months afterwards. It is possible they were indeed trying to solve it since the submission and it simply took this long to solve it due to it being a tricky one to solve, but it is still a shame.
 
F

ForgottenSeer 58943

I'm starting to question if SEPM/SEP is providing the protection that I would think they are. Or rather if any other Symantec products have security issues like this lurking.

It does.. Trend Micro had over 200 security vulns after researches spent some time with it. I was starting to like Norton, but problems started coming up. I was starting to like Trend, then they merged with the CIA... <Le Sigh>
 

Faybert

Level 24
Verified
Top Poster
Well-known
Jan 8, 2017
1,320
That isn't true. Which is why Apple don't turn around saying "Hi mate here's the master key to our encryption, remember the deal? We all get a free hamburger in exchange", instead they fight it and win.
I said 'antivirus', obvious that there are some companies that still resist in the United States, but antivirus? I do not trust any, evidence is what is not lacking.
 
D

Deleted member 65228

I said 'antivirus', obvious that there are some companies that still resist in the United States, but antivirus? I do not trust any, evidence is what is not lacking.
Feel free to share the evidence. I see government agencies hacking into AV vendors systems more than AV vendors willingly giving governments full access.

I'd rather trust a US-based AV than one from China. Regardless, no matter where you go, the government agencies will demand data and find a way to get it. Whether you use an AV from a vendor in the UK then you have GCHQ, in the US you have the NSA/FBI/CIA, in North Korea you'll have their government, same for Germany and everywhere else.

All the government agencies probably spy to an extent. Some of the best researchers will be in both US and China, and anywhere else the government may be questionable
 
Last edited by a moderator:
F

ForgottenSeer 58943

That isn't true. Which is why Apple don't turn around saying "Hi mate here's the master key to our encryption, remember the deal? We all get a free hamburger in exchange", instead they fight it and win.

People believe Apple's smoke and mirror responses to US Intel as reported in the media? Pfft.. Apple does that for publicity, nobody in their right mind would believe they mean it.. I mean, that is if you believe the MacOS Root bypass was a 'bug'. Apple was also first in line for Prism.

NSA leaker Edward Snowden refuses to use Apple's iPhone over spying concerns - report
 
D

Deleted member 65228

@ForgottenSeer 58943 Hmmmm well I do understand where you both are coming from, I am no fan of the US government either because I've seen a lot of WikiLeaks... But I just don't see the point on strictly disliking US for trust when a lot of countries are probably the same and maybe haven't been exposed as badly yet. All countries are likely to have surveillance on people to some form and regularly request data, nothing you can do about it... US are no better than Russia and vice-versa for other countries IMO
 
F

ForgottenSeer 58943

@ForgottenSeer 58943 Hmmmm well I do understand where you both are coming from, I am no fan of the US government either because I've seen a lot of WikiLeaks... But I just don't see the point on strictly disliking US for trust when a lot of countries are probably the same and maybe haven't been exposed as badly yet. All countries are likely to have surveillance on people to some form and regularly request data, nothing you can do about it... US are no better than Russia and vice-versa for other countries IMO

100% agreement here.

One thing to keep in mind. Many countries don't have the resources the US and China have to expend on surveillance. But at the core, I fully agree with you here.
 

ZeroDay

Level 30
Verified
Top Poster
Well-known
Aug 17, 2013
1,905
I said 'antivirus', obvious that there are some companies that still resist in the United States, but antivirus? I do not trust any, evidence is what is not lacking.
I often wonder if Comodo being a US company cooperate with the government maybe a back door, or government surveillance on the trusted vendors
list.
 

About us

  • MalwareTips is a community-driven platform providing the latest information and resources on malware and cyber threats. Our team of experienced professionals and passionate volunteers work to keep the internet safe and secure. We provide accurate, up-to-date information and strive to build a strong and supportive community dedicated to cybersecurity.

User Menu

Follow us

Follow us on Facebook or Twitter to know first about the latest cybersecurity incidents and malware threats.

Top