XML External Entities Injection Vulnerability in Symantec Protection Engine

Protection Engine for Cloud Services

1 more products

20708

14 September 2022

16 August 2022

CLOSED

HIGH

Summary

Symantec Protection Engine (SPE) is susceptible to an XML External Entities injection vulnerability. The SPE Java Console User Interface (UI) installation allows SPE administrator to add external entities in XML requests, which could potentially allow unauthorized access to restricted filesystem data. This vulnerability is not applicable to those who are using Cloud console or XML modifier directly (without the Java console).

 

Affected Product(s)

 

Symantec Protection Engine (SPE)

CVE

Affected Version(s)

Remediation

CVE-2022-37014

8.2.X

Apply SPE UI Server hotfix from this KB article: HERE

 

Issue Details

 

 CVE-2022-37014

 Severity/CVSSv3:

High / 8.1 AV:A/AC:L/PR:H/UI:N/S:C/C:H/I:N/A:H

 References:

 Impact:

 NVD: CVE-2022-37014

 XML External Entity Injection

 Description:

 The SPE Java Console User Interface installation allows external entites in XML requests, which could potentially allow unauthorized access to restricted filesystem data.

 

Mitigation & Additional Information

The following product updates have been made available to customers to remediate these issues:

Symantec recommends the following measures to reduce risk of attack:

  • Restrict access to administrative or management systems to authorized privileged users.
  • Restrict remote access to trusted/authorized systems only.
  • Run under the principle of least privilege, where possible, to limit the impact of potential exploit.
  • Keep all operating systems and applications current with vendor patches.
  • Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection for both inbound and outbound threats.
  • Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.

Acknowledgements