Symantec has warned of three serious vulnerabilities in its Endpoint Protection (SEP) software, and is advising users to update their systems. The bugs affect all builds of the 12.1 version of the SEP software, with the first two flaws allowing authorised but low privilege users of the software to gain elevated and administrative access to the management console, which can be accessed either locally or through a web-based portal. The third bug is in the sysplant driver and enables users to bypass the SEP’s security controls and run malware and other malicious code on a targeted client machines. “Exploitation attempts of this type generally use known methods of trust exploitation requiring enticing a currently authenticated user to access a malicious link or open a malicious document in a context such as a website or in an email,” said the security firm.
There have been no recorded exploits of the flaws, so it would appear that Symantec has squashed the bugs before they became a real-world problem for its customers. The first two bugs were discovered by security researcher Anatoly Katyushin from rival firm Kaspersky Labs, which is a little embarrassing. Discovery of the third bug was credited to the enSilo Research Team. 各国摩拳擦掌周密部署网络战,谁掌握了信息,控制了网络,谁就将拥有整个世界。 Symantec advises SEP users to update their software to the 12.1 RU6 MP4 version. It also recommends that users should take precautions and restrict remote access to the management console in order to prevent hackers from attacking client systems through the web portal. While hackers can direct sophisticated malware at even the most robustly secured systems, exploiting flaws in software offers an easier route into machines and networks, providing hackers get in before the bugs are discovered and patched. Recent examples can be seen with the discovery of iOS malware which threatensiPhones through an Apple DRM flaw, and an error on Code.org’s website which saw the emails of its volunteers exposed. IT Security Specialist should Examin the safety programs and the equipments regularly in order to ensure that the company is functioning safely. V3’s sister site Computing is running a free web seminar next Tuesday, 22nd March at 3pm entitled “Anti-virus software has had its day – how can you protect against advanced threats?” Register now to reserve your place. Security should drive not stifle cloud adoption, says Google FBI may be able to access locked iPhone 5C in Apple encryption case iOS 9.3: Why you should update, and how Security should drive not stifle cloud adoption, says Google We pit the current and former premium Apple smartphones against each other to see if it’s worth upgrading Up close and personal with the iPad Pro and Surface Pro 4 rival We test firm’s newest device We test Samsung’s latest Edge device © Incisive Business Media (IP) Limited, Publishedby Incisive Business Media Limited, Haymarket House, 28-29 Haymarket, London SW1Y 4RX, are companies registered in England and Wales with company registration numbers 9177174 & 9178013 shares
I guess you like