Symantec Data Loss Prevention Security Update
Summary
Broadcom's Enterprise Security Group has released an update to address an issue that was discovered in the Symantec Data Loss Prevention (DLP) Windows Endpoint.
Affected Product(s)
|
Symantec Data Loss Prevention (DLP) Windows Endpoint |
||
|
CVE |
Affected Version(s) |
Remediation |
|
CVE-2026-3991 |
Prior to DLP 16.1 MP2 or 25.1 MP1 |
Upgrade to DLP 25.1 MP1, 16.1 MP2, 16.0 RU2 HF9, 16.0 RU1 MP1 HF12, or 16.0 MP2 HF15. Please refer to Product Download Help for details. |
Issue Details
|
CVE-2026-3991 |
|
|
Severity/CVSSv3: |
High / 7.8 AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
|
References: Impact: |
NVD: CVE-2026-3991 Privilege Escalation |
|
Description: |
Symantec Data Loss Prevention, prior to 25.1 MP1 or 16.1 MP2, may be susceptible to an Elevation of Privilege vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or use. |
Mitigation & Additional Information
The following product updates have been made available to remediate this issue:
- DLP 25.1 MP1 (25.1.00100.60229)
- DLP 16.1 MP2 (16.1.00200.60431)
- DLP 16.0 RU2 HF9 (16.0.20009.60689)
- DLP 16.0 RU1 MP1 HF12 (16.0.10112.60928)
- DLP 16.0 MP2 HF15 (16.0.00215.62094)
The latest Symantec Data Loss Prevention releases and patches are available to customers via the Broadcom Download Center. Please refer to the Product Download Help for details.
Broadcom's Enterprise Security Group recommends the following measures to reduce risk of attack:
- Restrict access to administrative or management systems to authorized privileged users.
- Restrict remote access to trusted/authorized systems only.
- Run under the principle of least privilege, where possible, to limit the impact of potential exploit.
- Keep all operating systems and applications current with vendor patches.
- Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats.
- Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.
Acknowledgements
- CVE-2026-3991: Manuel Feifel of InfoGuard Labs