- TEMPORARILY DISABLE SYMANTEC ENDPOINT PROTECTION CLOUD SOFTWARE
- TEMPORARILY DISABLE SYMANTEC ENDPOINT PROTECTION CLOUD DOWNLOAD
- TEMPORARILY DISABLE SYMANTEC ENDPOINT PROTECTION CLOUD WINDOWS
If you would like to have SEP installed on a University-managed computer (managed by a department outside of CUIT*), please have your IT support person/team contact CUIT Security to purchase Symantec licenses. It should not be installed on servers or Columbia-owned/managed equipment. The Symantec installer was created for students' personal workstations and laptops.
TEMPORARILY DISABLE SYMANTEC ENDPOINT PROTECTION CLOUD DOWNLOAD
Students should uninstall Symantec, and visit CUIT's Malwarebytes for Students page to download our new endpoint security protection software. Note: Symantec for students was discontinued on Saturday, December 21st, 2019. Earlier this month at the SyScan 360 conference in Beijing, a researcher reported finding locally and remotely exploitable flaws in 14 popular antivirus engines.Symantec Endpoint Protection (SEP), formerly known as Symantec AntiVirus, is a virus and spyware scanning program developed by the Symantec Corporation. Symantec's endpoint security product is not the only one that's plagued by security flaws. If there is a bright side, it appears that there are no exploits in the wild yet and that local access to the machine is required to exploit these vulnerabilities."
TEMPORARILY DISABLE SYMANTEC ENDPOINT PROTECTION CLOUD SOFTWARE
"The fact is that software development is hard and even security software is not immune from exploitable vulnerabilities. "There is some irony in the fact that there are Zero Day vulnerabilities in the software that a large portion of users count on to protect their computer from malware and software vulnerabilities," commented Rick Wanner, a handler at the SANS Institute's Internet Storm Center. Customers who use version 11.x can protect themselves by disabling the Application and Device Control policy.
While the company finds a way to address the problem, users of Symantec Endpoint Protection 12.1 are advised to uninstall or disable the Application and Device Control (sysplant) driver. If the vulnerability is exploited by accessing the machine directly, it could result in a client crash, denial of service, or, if successful, escalate to admin privileges and gain control of the system," Symantec explained in its advisory. This vulnerability is not accessible remotely and only affects SEP clients actually running Application and Device Control. "The issue, as reported, affects the Application and Device Control component of Symantec Endpoint Protection. The security firm has rated the vulnerability as "medium severity," but claims to be handling it "with the utmost urgency and care." There's no evidence that the flaw is being exploited in the wild, Symantec noted. Endpoint Protection Manager, Symantec Endpoint Protection SBE, SEP.cloud and Symantec Network Access Control are not impacted by the flaw.
Symantec says the zero-day presented in the video affects all versions of Endpoint Protection clients 11.x and 12.x running Application and Device Control.
TEMPORARILY DISABLE SYMANTEC ENDPOINT PROTECTION CLOUD WINDOWS
The issues will also be reviewed at the company's Advanced Windows Exploitation (AWE) course at the Black Hat security conference. The vulnerabilities, all of which are local, have been reported to CERT, which in turn notified Symantec, Aharoni told SecurityWeek. Mati Aharoni, CEO of Offensive Security, says they have found a total of three zero-days in their initial analysis, two of which they've managed to exploit successfully. Offensive Security, which is known for the Kali Linux penetration testing distribution, published a video to demonstrate one of the privilege escalation exploits and promised to provide additional details in the upcoming days.
While conducting penetration testing for one of its customers, Offensive Security uncovered three zero-day vulnerabilities in Symantec Endpoint Protection (SEP) that can be exploited for privilege escalation.