7.8
CVSSv3

CVE-2020-5837

Published: 11/05/2020 Updated: 14/05/2020
CVSS v2 Base Score: 4.6 | Impact Score: 6.4 | Exploitability Score: 3.9
CVSS v3 Base Score: 7.8 | Impact Score: 5.9 | Exploitability Score: 1.8
VMScore: 409
Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Symantec Endpoint Protection, before 14.3, may not respect file permissions when writing to log files that are replaced by symbolic links, which can lead to a potential elevation of privilege.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

symantec endpoint protection

Github Repositories

CVE-2020-5837 exploit

CVE-2020-5837 exploit The write up can be found in the blog of the RedyOps Labs: labsredyopscom/indexphp/2020/04/27/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write/ Third Party Tools This exploit code, is heavily based on symboliclink-testing-tools which was Developed by James Forshaw The symboliclink-testing-tools can be found here: githubcom