Symantec Critical System Protection 8.0 < 8.0 MP2 Authentication Bypass (SYMSA1498)

critical Nessus Plugin ID 131765

Synopsis

The remote windows host has a security application installed that is affected by an authentication bypass vulnerability.

Description

The version of Symantec Critical System Protection (SCSP) installed on the remote Windows host is 8.0 prior to 8.0 MP2. It is, therefore, affected by an unspecified authentication bypass vulnerability.

Solution

Upgrade to Symantec Critical System Protection 8.0 MP2 or later.
Alternatively, apply the workarounds referenced in the vendor advisory.

See Also

https://support.symantec.com/us/en/article.symsa1498.html

http://www.nessus.org/u?7b5f54eb

Plugin Details

Severity: Critical

ID: 131765

File Name: symantec_critical_system_protection_SYMSA1498.nasl

Version: 1.2

Type: local

Agent: windows

Family: Windows

Published: 12/6/2019

Updated: 12/10/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.5

Temporal Score: 5.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-18374

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:symantec:critical_system_protection

Required KB Items: Settings/ParanoidReport, installed_sw/Symantec Critical System Protection

Exploit Ease: No known exploits are available

Patch Publication Date: 11/25/2019

Vulnerability Publication Date: 11/18/2019

Reference Information

CVE: CVE-2019-18374

BID: 110877

IAVA: 2019-A-0440