Remote Code Execution Vulnerability in Symantec Endpoint Protection's SysPlant.sys Driver
CVE-2015-8154

8.8HIGH

Key Information:

Vendor
Symantec
Vendor
CVE Published:
18 March 2016

Summary

The SysPlant.sys driver, part of the Application and Device Control (ADC) in Symantec Endpoint Protection version 12.1 prior to RU6-MP4, is susceptible to a serious remote code execution vulnerability. Attackers can exploit this flaw by crafting a malicious HTML document. When the document is opened by a victim, it can lead to unauthorized execution of arbitrary code, potentially compromising the system's security. This vulnerability is associated with improper permissions allowing RWX (read-write-execute) access, making it a significant threat to users who have not upgraded their SEP software.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.