CVE-2025-13919
Unknown
Unknown - Not Provided
COM Hijacking Vulnerability in Symantec Endpoint Protection Enables Persistence
Publication date: 2026-01-28
Last updated on: 2026-01-28
Assigner: Symantec Corporation
Description
Description
Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| symantec | endpoint_protection | to 14.3.0 (exc) |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-427 | The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a COM Hijacking issue in Symantec Endpoint Protection versions prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3. It allows an attacker to establish persistence and evade detection by hijacking COM references in the Windows Registry.
How can this vulnerability impact me? :
An attacker exploiting this vulnerability can maintain persistent access to a system and avoid detection by security software, potentially leading to unauthorized control or manipulation of the affected system.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70