Symantec Endpoint Protection Manager Java Object Deserialization RCE (SYM15-011)

Critical Nessus Plugin ID 87505


An application running on the remote host is affected by an arbitrary command execution vulnerability.


The remote Symantec Endpoint Protection Manager server is affected by a remote command execution vulnerability due to unsafe deserialize calls of unauthenticated Java objects to the Apache Commons Collections (ACC) library. An unauthenticated, remote attacker can exploit this, by sending a crafted multipart HTTP POST request, to execute arbitrary commands on the target host.


Upgrade to Symantec Endpoint Protection Manager 12.1 RU6 MP3 or later.

See Also

Plugin Details

Severity: Critical

ID: 87505

File Name: symantec_endpoint_prot_mgr_2015_6554.nasl

Version: $Revision: 1.3 $

Type: remote

Family: Web Servers

Published: 2015/12/18

Modified: 2016/05/02

Dependencies: 57766

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:ND

Vulnerability Information

CPE: cpe:/a:symantec:endpoint_protection_manager

Required KB Items: installed_sw/sep_mgr

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 2015/11/09

Vulnerability Publication Date: 2015/01/28

Reference Information

CVE: CVE-2015-6554

BID: 77494

OSVDB: 129952, 129984, 130424

CERT: 576313