Symantec Protection Engine Security Update

Protection Engine for Cloud Services

1 more products

22599

26 September 2023

26 September 2023

CLOSED

MEDIUM

Summary

Symantec, A Division of Broadcom has released updates to address an issue that was discovered in the Symantec Protection Engine (SPE) product.

This issue is only applicable to the legacy web console for SPE. 

 

Affected Product(s)

 

Symantec Protection Engine (SPE)

CVE

Affected Version(s)

Remediation

CVE-2023-23958

Prior to SPE 9.1.0

Upgrade to SPE 9.1.0 or see: https://knowledge.broadcom.com/external/article/274069 for additional mitigation options.

  

 

Issue Details

 

 CVE-2023-23958

 Severity/CVSSv3:

 Medium / 6.8 AV:N/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:N

 References:

 Impact:

 NVD: CVE-2023-23958

 Hash Leak Vulnerability

 Description:

Symantec Protection Engine, prior to 9.1.0, may be susceptible to a hash leak vulnerability, where sensitive information may be exposted to an actor that is not explicity authorized to have access to that information.

  

Mitigation & Additional Information

Symantec Protection Engine 9.1.0 has been made available to address this issue and can be downloaded via the Software Download Portal. Additional mitigation options are available at Symantec Protection Engine is affected by CVE-2023-23958.

Symantec recommends the following measures to reduce risk of attack:

  • Use the new Symantec Protection Engine centralized console.
  • Restrict access to administrative or management systems to authorized privileged users.
  • Restrict remote access to trusted/authorized systems only.
  • Run under the principle of least privilege, where possible, to limit the impact of potential exploit.
  • Keep all operating systems and applications current with vendor patches.
  • Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats.
  • Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.

Acknowledgements

  • CVE-2023-23958: Michal Bogdanowicz and Lukasz Bialek, NORDEA BANK ABP