Lucene search

K
cve[email protected]CVE-2018-18366
HistoryApr 25, 2019 - 8:29 p.m.

CVE-2018-18366

2019-04-2520:29:02
CWE-908
web.nvd.nist.gov
50
cve-2018-18366
symantec
norton security
sep
windows client
vulnerability
kernel memory disclosure
nvd

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%

Symantec Norton Security prior to 22.16.3, SEP (Windows client) prior to and including 12.1 RU6 MP9, and prior to 14.2 RU1, SEP SBE prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22, SEP-12.1.7484.7002 and SEP Cloud prior to 22.16.3 may be susceptible to a kernel memory disclosure, which is a type of issue where a specially crafted IRP request can cause the driver to return uninitialized memory.

Affected configurations

NVD
Node
symantecendpoint_protectionMatch11.0windows
OR
symantecendpoint_protectionMatch11.0mr1windows
OR
symantecendpoint_protectionMatch11.0mr2windows
OR
symantecendpoint_protectionMatch11.0mr3windows
OR
symantecendpoint_protectionMatch11.0mr4windows
OR
symantecendpoint_protectionMatch11.0mr4-mp2windows
OR
symantecendpoint_protectionMatch11.0ru5windows
OR
symantecendpoint_protectionMatch11.0ru6windows
OR
symantecendpoint_protectionMatch11.0ru6-mp1windows
OR
symantecendpoint_protectionMatch11.0ru6-mp2windows
OR
symantecendpoint_protectionMatch11.0ru6-mp3windows
OR
symantecendpoint_protectionMatch11.0ru6awindows
OR
symantecendpoint_protectionMatch11.0ru7windows
OR
symantecendpoint_protectionMatch11.0ru7-mp1windows
OR
symantecendpoint_protectionMatch11.0ru7-mp2windows
OR
symantecendpoint_protectionMatch11.0ru7-mp4windows
OR
symantecendpoint_protectionMatch11.0ru7-mp4awindows
OR
symantecendpoint_protectionMatch11.0ry7-mp3windows
OR
symantecendpoint_protectionMatch12.1windows
OR
symantecendpoint_protectionMatch12.1ru1windows
OR
symantecendpoint_protectionMatch12.1ru1-mp1windows
OR
symantecendpoint_protectionMatch12.1ru2windows
OR
symantecendpoint_protectionMatch12.1ru2-mp1windows
OR
symantecendpoint_protectionMatch12.1ru3windows
OR
symantecendpoint_protectionMatch12.1ru4windows
OR
symantecendpoint_protectionMatch12.1ru4-mp1windows
OR
symantecendpoint_protectionMatch12.1ru4-mp1awindows
OR
symantecendpoint_protectionMatch12.1ru4-mp1bwindows
OR
symantecendpoint_protectionMatch12.1ru4awindows
OR
symantecendpoint_protectionMatch12.1ru5windows
OR
symantecendpoint_protectionMatch12.1ru6windows
OR
symantecendpoint_protectionMatch12.1ru6-mp1windows
OR
symantecendpoint_protectionMatch12.1ru6-mp10windows
OR
symantecendpoint_protectionMatch12.1ru6-mp2windows
OR
symantecendpoint_protectionMatch12.1ru6-mp3windows
OR
symantecendpoint_protectionMatch12.1ru6-mp4windows
OR
symantecendpoint_protectionMatch12.1ru6-mp5windows
OR
symantecendpoint_protectionMatch12.1ru6-mp6windows
OR
symantecendpoint_protectionMatch12.1ru6-mp7windows
OR
symantecendpoint_protectionMatch12.1ru6-mp8windows
OR
symantecendpoint_protectionMatch14windows
OR
symantecendpoint_protectionMatch14mp1windows
OR
symantecendpoint_protectionMatch14.0.0mp2windows
OR
symantecendpoint_protectionMatch14.0.1windows
OR
symantecendpoint_protectionMatch14.0.1mp1windows
OR
symantecendpoint_protectionMatch14.0.1mp2windows
OR
symantecendpoint_protectionMatch14.2windows
OR
symantecendpoint_protectionMatch14.2mp1windows
OR
symantecendpoint_protectionMatchnis-22.15.2.22small_business
OR
symantecendpoint_protectionMatchsep-12.1.7484.7002small_business
OR
symantecendpoint_protection_cloudRange<22.16.3
OR
symantecendpoint_protection_cloud_agentRange<3.00.31.2817small_business
OR
symantecnorton_securityRange<22.16.3windows

CNA Affected

[
  {
    "product": "Norton Security",
    "vendor": "Symantec Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "Prior to 22.16.3"
      }
    ]
  },
  {
    "product": "SEP (Windows client)",
    "vendor": "Symantec Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "Prior to and including 12.1 RU6 MP9"
      },
      {
        "status": "affected",
        "version": "Prior to 14.2 RU1"
      }
    ]
  },
  {
    "product": "SEP SBE",
    "vendor": "Symantec Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "Prior to Cloud Agent 3.00.31.2817"
      },
      {
        "status": "affected",
        "version": "NIS-22.15.2.22"
      },
      {
        "status": "affected",
        "version": "SEP-12.1.7484.7002"
      }
    ]
  },
  {
    "product": "SEP Cloud",
    "vendor": "Symantec Corporation",
    "versions": [
      {
        "status": "affected",
        "version": "Prior to 22.16.3"
      }
    ]
  }
]

2.1 Low

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:L/AC:L/Au:N/C:P/I:N/A:N

6.5 Medium

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N

6.3 Medium

AI Score

Confidence

High

0.0004 Low

EPSS

Percentile

14.2%