Lucene search

K
symantecSymantec Security ResponseSMNTC-111094
HistoryDec 11, 2019 - 12:00 a.m.

Symantec Messaging Gateway CVE-2019-18377 Privilege Escalation Vulnerability

2019-12-1100:00:00
Symantec Security Response
www.symantec.com
64

0.001 Low

EPSS

Percentile

39.4%

Description

Symantec Messaging Gateway is prone to a privilege-escalation vulnerability. An attacker can exploit this issue to gain elevated privileges on an affected system. Symantec Messaging Gateway versions prior to 10.7.3 are vulnerable.

Technologies Affected

  • Symantec Messaging Gateway 10.0
  • Symantec Messaging Gateway 10.0.1
  • Symantec Messaging Gateway 10.0.2
  • Symantec Messaging Gateway 10.0.3
  • Symantec Messaging Gateway 10.1
  • Symantec Messaging Gateway 10.5.0
  • Symantec Messaging Gateway 10.5.1
  • Symantec Messaging Gateway 10.5.2
  • Symantec Messaging Gateway 10.6
  • Symantec Messaging Gateway 10.6.0-3
  • Symantec Messaging Gateway 10.6.0-7
  • Symantec Messaging Gateway 10.6.1
  • Symantec Messaging Gateway 10.6.1-3
  • Symantec Messaging Gateway 10.6.2
  • Symantec Messaging Gateway 10.6.3
  • Symantec Messaging Gateway 10.6.3-266
  • Symantec Messaging Gateway 10.6.3-267
  • Symantec Messaging Gateway 10.6.4
  • Symantec Messaging Gateway 10.6.5
  • Symantec Messaging Gateway 10.6.6
  • Symantec Messaging Gateway 10.7.0
  • Symantec Messaging Gateway 10.7.1
  • Symantec Messaging Gateway 10.7.2
  • Symantec Messaging Gateway 9.5
  • Symantec Messaging Gateway 9.5.1
  • Symantec Messaging Gateway 9.5.2
  • Symantec Messaging Gateway 9.5.3
  • Symantec Messaging Gateway 9.5.3-3
  • Symantec Messaging Gateway 9.5.4

Recommendations

Block external access at the network boundary, unless external parties require service.
If possible, block access to the server at the network perimeter. Allow only trusted computers and networks to have access to the resources.

Run all software as a nonprivileged user with minimal access rights.
Run all non-administrative software as a non-administrative user with the least amount of privileges required to successfully operate. This will greatly reduce the potential damage that successful exploitation may achieve.

Deploy network intrusion detection systems to monitor network traffic for malicious activity.
Deploy NIDS to monitor the network for suspicious requests. This may help detect attacks that try to exploit These and similar vulnerabilities. Audit all applicable logs regularly.

Updates are available. Please see the references or vendor advisory for more information.

0.001 Low

EPSS

Percentile

39.4%