Symantec Network Protection products that include a vulnerable version of the Linux kernel are susceptible to multiple vulnerabilities. A remote attacker, with access to the management interface, can obtain unauthorized read/write access to local files, cause denial of service, and possible execute arbitrary code.
CVE |Supported Version(s)|Remediation
CVE-2018-5390 | 6.6 | Upgrade to later release with fixes.
6.7 | Upgrade to 6.7.4.8.
7.1 | Upgrade to later release with fixes.
7.2 | Not vulnerable, fixed
CVE |Supported Version(s)|Remediation
CVE-2018-5391 | 1.3, 2.1, 2.2, 2.3 | Upgrade to later version with fixes.
2.4, 3.0 | Not available at this time
3.1 | Not vulnerable, fixed in 3.1.0.0.
CVE |Supported Version(s)|Remediation
CVE-2017-18017, CVE-2018-5390,
CVE-2018-5391 | 6.1 | Upgrade to a version of MC with the fixes.
CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 4.2 | Upgrade to a version of Content Analysis with fixes.
CVE |Supported Version(s)|Remediation
CVE-2018-5391 | 1.1 | Upgrade to a version of CAS and SMG with the fixes.
CVE |Supported Version(s)|Remediation
CVE-2018-5391 | 2.0 - 2.4 | Upgrade to later release with fixes.
3.0 and later | Not vulnerable, fixed in 3.0.1.1
CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 11.6, 11.9, 11.10 | A fix will not be provided. Allot Secure Services Gateway (SSG) is a replacement product for PS S-Series. Switch to a version of SSG with the vulnerability fixes.
CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 1.1 | A fix will not be provided. Allot NetXplorer is a replacement product for PC S-Series. Switch to a version of NetXplorer with the vulnerability fixes.
CVE |Supported Version(s)|Remediation
CVE-2018-5390 | 6.5, 6.6 | Upgrade to later release with fixes.
6.7 | Upgrade to 6.7.4.8.
7.1 | Upgrade to later release with fixes.
7.2 | Not vulnerable, fixed in 7.2.0.1.
CVE |Supported Version(s)|Remediation
CVE-2018-5391 | 9.5 | Not vulnerable
10.1, 10.2, 10.3, 10.4 | Upgrade to later release with fixes.
10.5 | Not vulnerable, fixed in 10.5.1.1.
CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 7.2, 7.3, 8.0 | Upgrade to later release with fixes.
8.1 | Not vulnerable, fixed in 8.1.1.
CVE |Supported Version(s)|Remediation
CVE-2018-5390 | 3.10, 3.11, 3.12, 5.0 | Upgrade to later release with fixes.
4.2, 4.3, 4.4 | Not vulnerable
4.5 | Not available at this time
5.2 | Not vulnerable, fixed in 5.2.1.1.
CVE-2018-5391 | 3.10, 3.11, 3.12, 4.2, 4.3, 4.4, 5.0 | Upgrade to later release with fixes.
4.5 | Not available at this time
5.2 | Not vulnerable, fixed in 5.2.1.1.
CVE |Supported Version(s)|Remediation
CVE-2018-5390, CVE-2018-5391 | 10.0, 11.0 | A fix will not be provided.
The following products are not vulnerable:
AuthConnector
BCAAA
CacheFlow
Cloud Data Protection for ServiceNow
Cloud Data Protection for Oracle CRM On Demand
Cloud Data Protection Integration Server
Cloud Data Protection Communication Server General Auth Connector Login Application
HSM Agent for the Luna SP
IntelligenceCenter
IntelligenceCenter Data Collector PacketShaper PolicyCenter ProxyAV ProxyAV ConLog and ConLogXP **Unified Agent
Web Isolation
WSS Mobile Agent
**
Severity / CVSSv3 | Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References| SecurityFocus: BID 100517 / NVD: CVE-2017-13715 Impact| Denial of service, code execution Description | A flaw in internal state initialization allows a remote attacker to send a crafted MPLS packet and cause denial of source through a system crash, or possibly execute arbitrary code.
Severity / CVSSv3 | High / 8.8 (AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References| SecurityFocus: BID 100809 / NVD: CVE-2017-1000251 Impact| Code execution Description | A flaw in L2CAP configuration responses in the native Bluetooth stack allows a remote attacker to send crafted responses and execute arbitrary code.
Severity / CVSSv3 | Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References| SecurityFocus: BID 102367 / NVD: CVE-2017-18017 Impact| Denial of service Description | A flaw in TCPMSS firewall target processing allows a remote attacker to send crafted packets and cause denial of service or unspecified other impact.
Severity / CVSSv3 | High / 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) References| SecurityFocus: BID 104976 / NVD: CVE-2018-5390 Impact| Denial of service Description | A flaw in TCP fragment reassembly allows a remote attacker to send crafted TCP fragments and cause denial of service through CPU exhaustion.
Severity / CVSSv3 | High / 7.5 (AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H) References| SecurityFocus: BID 105108 / NVD: CVE-2018-5391 Impact| Denial of service Description | A flaw in IP fragment reassembly allows a remote attacker to send crafted IP fragments and cause denial of service.
Severity / CVSSv3 | Critical / 9.8 (AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) References| NVD: CVE-2018-5703 Impact| Denial of service Description | A flaw in the TLS implementation allows a remote attacker to send crafted packets and cause a system crash, resulting in denial of service.
Severity / CVSSv3 | High / 7.4 (AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N) References| NVD: CVE-2018-1000028 Impact| Security control bypass Description | A flaw in NFS access control allows a remote attacker to get unauthorized read/write access to local files.
Severity / CVSSv3 | Medium / 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) References| SecurityFocus: BID 105154 / NVD: CVE-2018-10938 Impact| Denial of service Description | A flaw in packet handling allows a remote attacker to send crafted packets and cause denial of service through an infinite loop.
Severity / CVSSv3 | Medium / 5.9 (AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H) References| NVD: CVE-2018-14641 Impact| Denial of service Description | A flaw in IP fragment reassembly allows a remote attacker to send crafted IP fragments and cause denial of service.
2021-07-20 A fix for SSLV 4.4 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2021-07-15 A fix for Security Analytics 7.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2021-06-07 A fix for SSLV 3.10, SSLV 3.12, and SSLV 5.0 will not be provided. Please upgrade to a later version with the vulnerability fixes. SSLV 5.2 is not vulnerable because a fix is available in 5.2.1.1.
2021-02-18 A fix for CA 2.3 and MC 2.4 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2020-11-30 MC 3.0 is not vulnerable because a fix is available in 3.0.1.1.
2020-11-19 A fix for MTD 1.1 will not be provided. Please upgrade to a version of CAS and SMG with the vulnerability fixes. A fix for SA 7.3 and 8.0 will not be provided. Please upgrade to a later version with the vulnerability fixes. A fix for XOS 9.7, 10.0, and 11.0 will not be provided. A fix for Director 6.1 will not be provided. Please upgrade to a version of MC with the vulnerability fixes. A fix for Reporter 10.4 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2020-11-12 Content Analysis 3.1 is not vulnerable because a fix is available in 3.1.0.0.
2020-08-19 A fix for MC 2.3 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2020-04-30 A fix will not be provided for ProxySG 6.5. Please upgrade to a later version with the vulnerability fixes.
2020-04-08 Content Analysis 3.0 is vulnerable to CVE-2018-5391. Reporter 10.5 is not vulnerable because a fix is available in 10.5.1.1. Security Analytics 8.1 is not vulnerable because a fix is available in 8.1.1. Fixes will not be provided for Management Center 2.2 and Reporter 10.3. Please upgrade to later versions with the vulnerability fixes.
2020-04-04 A fix for PacketShaper S-Series will not be provided. Allot Secure Services Gateway (SSG) is a replacement product for PacketShaper S-Series. Switch to a version of SSG with the vulnerability fixes. A fix for PolicyCenter S-Series will not be provided. Allot NetXplorer is a replacement product for PolicyCenter S-Series. Switch to a version of NetXplorer with the vulnerability fixes.
2020-01-28 A fix will not be provided for ASG 7.1 and ProxySG 7.1. Please upgrade to a later version with the vulnerability fix. ASG and ProxySG 7.2 are not vulnerable because fixes are available in 7.2.0.1 EA.
2020-01-19 A fix will not be provided for Malware Analysis. Please upgrade to a version of Content Analysis with the vulnerability fixes. PacketShaper and ProxyAV are not vulnerable.
2019-10-02 Web Isolation is not vulnerable.
2019-09-05 A fix for MC 2.1 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-30 Reporter 10.4 is vulnerable to CVE-2018-5390 and CVE-2018-5391.
2019-08-19 CA, MTD, MC, Reporter 10.x, and SSLV 4.2-4.4 are not vulnerable to CVE-2018-5390. SSLV 3.12 and 4.5 are vulnerable to CVE-2018-5390 and CVE-2018-5391. CA 2.4 is vulnerable to CVE-2018-5391.
2019-08-13 MC 2.2 and MC 2.3 are vulnerable to CVE-2018-5390 and CVE-2018-5391. A fix for MC 2.0 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-07 A fix for ASG 6.6 and ProxySG 6.6 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-06 A fix for Reporter 10.1 and 10.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-08-06 A fix for SSLV 4.3 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-07-25 It was previously reported that a fix for CVE-2018-5390 in ASG 6.7 is available in 6.7.4.141 EA. Further investigation has shown that ASG 6.7.4.141 EA is still vulnerable. A fix for CVE-2018-5390 in ASG 6.7 and ProxySG 6.7 is available in 6.7.4.8. ASG and ProxySG are not vulnerable to CVE-2018-5391.
2019-02-04 A fix for CA 1.3 and CA 2.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-01-18 SSLV 5.0 is vulnerable to CVE-2018-5390 and CVE-2018-5391. A fix for SSLV 3.11 and 4.2 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2019-01-14 Reporter 10.3 is vulnerable to CVE-2018-5390 and CVE-2018-5391.
2019-01-13 SSLV 3.x and 4.x are vulnerable to CVE-2018-5390 and CVE-2018-5391. A fix is not available at this time.
2019-01-11 A fix for CA 2.1 will not be provided. Please upgrade to a later version with the vulnerability fixes.
2018-11-28 initial public release