Symantec Diagnostic Tool Security Update

Cloud Secure Web Gateway - Cloud SWG

0 more products

25417

19 February 2025

19 February 2025

CLOSED

HIGH

7.8

CVE-2025-0893

Summary

Symantec, A Division of Broadcom has released an update to address an issue that were discovered in the Symantec Diagnostic Tool (SymDiag).

The issue is only applicable to the combination of SymDiag and the WSS Agent together. No other product comibations are affected. 
 

Affected Product(s)

 

Symantec Diagnostic Tool (SymDiag)

CVE

Affected Version(s)

Remediation

CVE-2025-0893

Prior to SymDiag 3.0.79

No action required. SymDiag has already been updated or purged on all affected agents. SymDiag 3.0.79 or later is automatically downloaded on launch.

 

 

Issue Details

 

 CVE-2025-0893

 Severity/CVSSv3:

 High / 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

 References:

 Impact:

 NVD: CVE-2025-0893

 Privilege Escalation

 Description:

Symantec Diagnostic Tool (SymDiag), prior to 3.0.79, may be susceptible to a Privilege Escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.

 

Mitigation & Additional Information

Symantec Diagnostic Tool (SymDiag) 3.0.79 has been made available which addresses this issue and has already been updated, or the older version purged from affected agents. The issue is only applicable to the combination of SymDiag and the WSS Agent together. No other product combinations are affected.

Symantec recommends the following measures to reduce risk of attack:

  • Restrict access to administrative or management systems to authorized privileged users.
  • Restrict remote access to trusted/authorized systems only.
  • Run under the principle of least privilege, where possible, to limit the impact of potential exploit.
  • Keep all operating systems and applications current with vendor patches.
  • Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats.
  • Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.

Acknowledgements