CVE-2016-9094

Severity
7.8HIGH
EPSS
0.3%
top 47.14%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedApr 16
Latest updateMay 14

Description

Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality. The quarantine logs can be exported for review by the user in a variety of formats including .CSV files. Prior to 14.0 MP1 and 12.1 RU6 MP7, the potential exists for file metadata to be interpreted and evaluated as a formula. Successful exploitation of an attack of this type requires considerable direct user-interaction from the user exporting and then opening the log files on

CVSS vector

CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:HExploitability: 1.8 | Impact: 5.9

Affected Packages2 packages

CVEListV5symantec_corporation/endpoint_protectionPrior to SEP 14.0 MP1 & SEP 12.1 RU6 MP7

🔴Vulnerability Details

2
GHSA
GHSA-cgj4-g3hw-mr32: Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality2022-05-14
CVEList
CVE-2016-9094: Symantec Endpoint Protection clients place detected malware in quarantine as part of the intended product functionality2018-04-16
CVE-2016-9094 (HIGH CVSS 7.8) | Symantec Endpoint Protection client | cvebase.io