Menu
No patch yet for zero day in Symantec Endpoint Protection software driver

No patch yet for zero day in Symantec Endpoint Protection software driver

Symantec has published recommendations for mitigating the danger

A zero-day flaw in a software driver in Symantec's widely used Endpoint Protection product may be tricky to fix.

The flaw is contained in the Application and Device Control driver, which is in Endpoint Protection versions 11.x and 12.x, the security company wrote in an advisory on Wednesday.

The vulnerability in Endpoint Protection was found by training and penetration testing company Offensive Security, one of three it uncovered in the product during a recent penetration test of a financial services firm.

All are privilege escalation vulnerabilities, which would allow a user with restricted access to gain higher access on a computer, which could be parlayed into broader network access.

So far, no known compromises have been reported, Symantec said, writing that the medium severity flaw is being handled "with the utmost urgency and care."

Software drivers are not easy to upgrade. It wasn't clear if users will have to reinstall Endpoint Protection with an upgraded driver or if Symantec can issue a patch.

The disclosure comes as a researcher from Singapore security firm COSEINC warned antivirus programs frequently have security flaws, making the applications prime targets for attack due to their deep integration with a computer's operating system.

Mati Aharoni, lead trainer and developer for Offensive Security, said the company plans to preview proof-of-concept code for the Endpoint Protection flaw during its Advanced Windows Exploitation training class at the Black Hat security conference in Las Vegas next month. Offensive Security published a video earlier this week demonstrating what it said was a successful attack.

Administrators have a few options to mitigate the risk in the meantime. Symantec published instructions for disabling the Application and Device Control driver in Endpoint Protection version 12.1. For those on versions 11.x, the Application and Device control policy can be disabled.

Send news tips and comments to jeremy_kirk@idg.com. Follow me on Twitter: @jeremy_kirk


Follow Us

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

Tags symantecExploits / vulnerabilitiesOffensive Security

Events

Featured

Slideshows

Channel kicks 2021 into gear as After Hours returns to Auckland

Channel kicks 2021 into gear as After Hours returns to Auckland

After Hours made a welcome return to the channel social calendar with a bumper crowd of partners, distributors and vendors descending on The Pantry at Park Hyatt in Auckland to kick-start 2021.

Channel kicks 2021 into gear as After Hours returns to Auckland
The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards

Hundreds of leaders from the New Zealand IT industry gathered at the Hilton in Auckland on 17 November to celebrate the finest female talent in the Kiwi channel and recognise the winners of the Reseller News Women in ICT Awards (WIICTA) 2020.

The Kiwi channel gathers for the 2020 Reseller News Women in ICT Awards
Show Comments