Vulnerability Details : CVE-2015-8799
Directory traversal vulnerability in the Management Server in Symantec Embedded Security: Critical System Protection (SES:CSP) 1.0.x before 1.0 MP5, Embedded Security: Critical System Protection for Controllers and Devices (SES:CSP) 6.5.0 before MP1, Critical System Protection (SCSP) before 5.2.9 MP6, Data Center Security: Server Advanced Server (DCS:SA) 6.x before 6.5 MP1 and 6.6 before MP1, and Data Center Security: Server Advanced Server and Agents (DCS:SA) through 6.6 MP1 allows remote authenticated users to write update-package data to arbitrary agent locations via unspecified vectors.
Vulnerability category: Directory traversal
Products affected by CVE-2015-8799
- cpe:2.3:a:broadcom:symantec_critical_system_protection:*:*:*:*:*:*:*:*
- Broadcom » Symantec Data Center Security Server » Advanced EditionVersions from including (>=) 6.0.0 and before (<) 6.5.0cpe:2.3:a:broadcom:symantec_data_center_security_server:*:*:*:*:advanced:*:*:*
- cpe:2.3:a:broadcom:symantec_data_center_security_server:6.6.0:*:*:*:advanced:*:*:*
- cpe:2.3:a:broadcom:symantec_data_center_security_server:6.5.0:-:*:*:advanced:*:*:*
- cpe:2.3:a:broadcom:symantec_data_center_security_server_and_agents:6.6.0:*:*:*:advanced:*:*:*
- Broadcom » Symantec Embedded Security Critical System ProtectionVersions up to, including, (<=) 1.0cpe:2.3:o:broadcom:symantec_embedded_security_critical_system_protection:*:*:*:*:*:*:*:*
- Broadcom » Symantec Embedded Security Critical System Protection For Controllers And Devices » Version: 6.5.0cpe:2.3:o:broadcom:symantec_embedded_security_critical_system_protection_for_controllers_and_devices:6.5.0:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2015-8799
1.46%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 79 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-8799
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.1
|
HIGH | AV:N/AC:H/Au:S/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.6
|
HIGH | CVSS:3.1/AV:A/AC:H/PR:H/UI:N/S:C/C:H/I:H/A:H |
1.0
|
6.0
|
NIST |
CWE ids for CVE-2015-8799
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-8799
-
http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20160607_00
Symantec Embedded Security: Critical System Protection and Symantec Data Center Security: Server AdvVendor Advisory
-
http://www.securityfocus.com/bid/90885
Multiple Symantec Products CVE-2015-8799 Binary Planting VulnerabilityThird Party Advisory;VDB Entry
Jump to