Vulnerability Details : CVE-2018-18366
Symantec Norton Security prior to 22.16.3, SEP (Windows client) prior to and including 12.1 RU6 MP9, and prior to 14.2 RU1, SEP SBE prior to Cloud Agent 3.00.31.2817, NIS-22.15.2.22, SEP-12.1.7484.7002 and SEP Cloud prior to 22.16.3 may be susceptible to a kernel memory disclosure, which is a type of issue where a specially crafted IRP request can cause the driver to return uninitialized memory.
Products affected by CVE-2018-18366
- cpe:2.3:a:symantec:endpoint_protection:14.2:*:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp10:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru1-mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1b:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp4:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp6:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:mr4:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru5:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6a:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:sep-12.1.7484.7002:*:*:*:small_business:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:nis-22.15.2.22:*:*:*:small_business:*:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru2:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru2-mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru3:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru4:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp8:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:*:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:mr1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:mr2:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ry7-mp3:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp4a:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:*:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp2:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:14.0.1:*:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:14.0.0:mp2:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:14:mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru5:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp2:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp3:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp2:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru6-mp3:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:14.2:mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:14.0.1:mp1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:14:*:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru1:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru4-mp1a:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru4a:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp5:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:12.1:ru6-mp7:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:mr3:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:mr4-mp2:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru7:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection:11.0:ru7-mp2:*:*:*:windows:*:*
- cpe:2.3:a:symantec:norton_security:*:*:*:*:*:windows:*:*
- cpe:2.3:a:symantec:endpoint_protection_cloud:*:*:*:*:*:*:*:*
- Symantec » Endpoint Protection Cloud Agent » Small Business EditionVersions before (<) 3.00.31.2817cpe:2.3:a:symantec:endpoint_protection_cloud_agent:*:*:*:*:small_business:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2018-18366
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 12 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2018-18366
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
2.1
|
LOW | AV:L/AC:L/Au:N/C:P/I:N/A:N |
3.9
|
2.9
|
NIST | |
6.5
|
MEDIUM | CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N |
2.0
|
4.0
|
NIST |
CWE ids for CVE-2018-18366
-
The product uses or accesses a resource that has not been initialized.Assigned by: nvd@nist.gov (Primary)
References for CVE-2018-18366
-
http://www.securityfocus.com/bid/107994
Multiple Symantec Products CVE-2018-18366 Local Information Disclosure VulnerabilityThird Party Advisory;VDB Entry
-
https://support.symantec.com/en_US/article.SYMSA1479.html
Norton SEP Multiple IssuesVendor Advisory
Jump to