Symantec Diagnostic Tool Security Update
25417
19 February 2025
19 February 2025
CLOSED
HIGH
7.8
CVE-2025-0893
Summary
Symantec, A Division of Broadcom has released an update to address an issue that were discovered in the Symantec Diagnostic Tool (SymDiag).
The issue is only applicable to the combination of SymDiag and the WSS Agent together. No other product comibations are affected.
Affected Product(s)
Symantec Diagnostic Tool (SymDiag) |
||
CVE |
Affected Version(s) |
Remediation |
CVE-2025-0893 |
Prior to SymDiag 3.0.79 |
No action required. SymDiag has already been updated or purged on all affected agents. SymDiag 3.0.79 or later is automatically downloaded on launch. |
Issue Details
CVE-2025-0893 |
|
Severity/CVSSv3: |
High / 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
References: Impact: |
NVD: CVE-2025-0893 Privilege Escalation |
Description: |
Symantec Diagnostic Tool (SymDiag), prior to 3.0.79, may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user. |
Mitigation & Additional Information
Symantec Diagnostic Tool (SymDiag) 3.0.79 has been made available which addresses this issue and has already been updated, or the older version purged from affected agents. The issue is only applicable to the combination of SymDiag and the WSS Agent together. No other product combinations are affected.
Symantec recommends the following measures to reduce risk of attack:
- Restrict access to administrative or management systems to authorized privileged users.
- Restrict remote access to trusted/authorized systems only.
- Run under the principle of least privilege, where possible, to limit the impact of potential exploit.
- Keep all operating systems and applications current with vendor patches.
- Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats.
- Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.
Acknowledgements
- CVE-2025-0893: Ary Dobrovolskiy