Symantec Critical System Protection 8.0 < 8.0 MP2 Authentication Bypass (SYMSA1498)

critical Nessus Plugin ID 131765


The remote windows host has a security application installed that is affected by an authentication bypass vulnerability.


The version of Symantec Critical System Protection (SCSP) installed on the remote Windows host is 8.0 prior to 8.0 MP2. It is, therefore, affected by an unspecified authentication bypass vulnerability.


Upgrade to Symantec Critical System Protection 8.0 MP2 or later.
Alternatively, apply the workarounds referenced in the vendor advisory.

See Also

Plugin Details

Severity: Critical

ID: 131765

File Name: symantec_critical_system_protection_SYMSA1498.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 12/6/2019

Updated: 12/10/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-18374


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:critical_system_protection

Required KB Items: Settings/ParanoidReport, installed_sw/Symantec Critical System Protection

Exploit Ease: No known exploits are available

Patch Publication Date: 11/25/2019

Vulnerability Publication Date: 11/18/2019

Reference Information

CVE: CVE-2019-18374

BID: 110877

IAVA: 2019-A-0440