Symantec Endpoint Protection (Windows) agent, prior to 14.3 RU6/14.3 RU5 Patch 1, may be susceptible to a Security Control Bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing security controls. This CVE applies narrowly to the Client User Interface Password protection and Policy Import/Export Password protection, if it has been enabled.

Subscriptions

Vendors Products
Broadcom Subscribe
Symantec Endpoint Protection Subscribe

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2022-39674 Symantec Endpoint Protection (Windows) agent, prior to 14.3 RU6/14.3 RU5 Patch 1, may be susceptible to a Security Control Bypass vulnerability, which is a type of issue that can potentially allow a threat actor to circumvent existing security controls. This CVE applies narrowly to the Client User Interface Password protection and Policy Import/Export Password protection, if it has been enabled.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 24 Apr 2025 21:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: symantec

Published:

Updated: 2025-04-24T20:26:10.073Z

Reserved: 2022-07-28T00:00:00.000Z

Link: CVE-2022-37017

cve-icon Vulnrichment

Updated: 2024-08-03T10:21:32.476Z

cve-icon NVD

Status : Modified

Published: 2022-12-01T14:15:11.973

Modified: 2025-04-24T21:15:18.830

Link: CVE-2022-37017

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses