CVE-2025-13919
Unknown Unknown - Not Provided
COM Hijacking Vulnerability in Symantec Endpoint Protection Enables Persistence

Publication date: 2026-01-28

Last updated on: 2026-01-28

Assigner: Symantec Corporation

Description
Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry.
CVSS Scores
EPSS Scores
Probability:
Percentile:
Meta Information
Published
2026-01-28
Last Modified
2026-01-28
Generated
2026-05-07
AI Q&A
2026-01-29
EPSS Evaluated
2026-05-05
NVD
EUVD
Affected Vendors & Products
Showing 1 associated CPE
Vendor Product Version / Range
symantec endpoint_protection to 14.3.0 (exc)
Helpful Resources
Exploitability
CWE
CWE Icon
KEV
KEV Icon
CWE ID Description
CWE-427 The product uses a fixed or controlled search path to find resources, but one or more locations in that path can be under the control of unintended actors.
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?

This vulnerability is a COM Hijacking issue in Symantec Endpoint Protection versions prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3. It allows an attacker to establish persistence and evade detection by hijacking COM references in the Windows Registry.


How can this vulnerability impact me? :

An attacker exploiting this vulnerability can maintain persistent access to a system and avoid detection by security software, potentially leading to unauthorized control or manipulation of the affected system.


Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70
EPSS Chart