-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2020.0140
               Symantec Endpoint Detection and Response XSS
                              14 January 2020

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           Symantec Endpoint Detection and Response
Publisher:         Symantec
Operating System:  Windows
Impact/Access:     Cross-site Scripting -- Remote with User Interaction
Resolution:        Patch/Upgrade
CVE Names:         CVE-2019-19547  

Original Bulletin: 
   http://support.symantec.com/us/en/article.SYMSA1502.html

- --------------------------BEGIN INCLUDED TEXT--------------------

Symantec Endpoint Detection and Response XSS

SYMSA1502
Last Updated January 13, 2020
Initial Publication Date January 06, 2020

  o Status: Closed
  o Severity: Medium
  o CVSS Base Score: 4.7

Summary:

Affected Products
+----------------------------------------------------+
|Symantec Endpoint Detection and Response (SEDR)     |
+---------------+-------------------+----------------+
|CVE            |Affected Version(s)|Remediation     |
+---------------+-------------------+----------------+
|CVE-2019-19547|Prior to 4.3.0     |Upgrade to 4.3.0 |
+---------------+-------------------+----------------+

Issues:

+-----------------------------------------------------------------------------+
|CVE-2019-19547                                                              |
+------------+----------------------------------------------------------------+
|Severity/   |Medium / 4.7 AV:N/AC:L/PR:N/UI:R/S:C/C:N/I:L/A:N                |
|CVSSv3:     |                                                                |
+------------+----------------------------------------------------------------+
|References: |Security Focus: BID 111367 / NVD: CVE-2019-19547                |
|            |                                                                |
|Impact:     |XSS                                                             |
+------------+----------------------------------------------------------------+
|            |Symantec Endpoint Detection and Response (SEDR), prior to 4.3.0,|
|            |may be susceptible to a cross site scripting (XSS) issue. XSS is|
|Description:|a type of issue that can enable attackers to inject client-side |
|            |scripts into web pages viewed by other users. An XSS            |
|            |vulnerability may be used by attackers to potentially bypass    |
|            |access controls such as the same-origin policy.                 |
+------------+----------------------------------------------------------------+

Mitigation

A Symantec Endpoint Detection and Response (SEDR) update, version 4.3.0 has
been made available that addresses the listed issue. Note that the latest
Symantec Endpoint Detection and Response releases and patches are available to
customers through normal support channels.

Symantec has also created additional detections and protections which are in
place and is continuing to monitor any attempts of this exploit against our
products. At this time, there is no evidence of any attempts at this exploit in
the wild.

Symantec recommends the following measures to reduce risk of attack:

  o Restrict access to administrative or management systems to authorized
    privileged users.
  o Restrict remote access to trusted/authorized systems only.
  o Run under the principle of least privilege, where possible, to limit the
    impact of potential exploit.
  o Keep all operating systems and applications current with vendor patches.
  o Follow a multi-layered approach to security. At a minimum, run both
    firewall and anti-malware applications to provide multiple points of
    detection and protection for both inbound and outbound threats.
  o Deploy network and host-based intrusion detection systems to monitor
    network traffic for signs of anomalous or suspicious activity. This may aid
    in the detection of attacks or malicious activity related to the
    exploitation of latent vulnerabilities.

Acknowledgements:

  o CVE-2019-19547: Bencherchali Nasreddine | <www.elit.dz>

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=H0lD
-----END PGP SIGNATURE-----