ID CVE-2019-12751
Summary Symantec Messaging Gateway, prior to 10.7.1, may be susceptible to a privilege escalation vulnerability, which is a type of issue whereby an attacker may attempt to compromise the software application to gain elevated access to resources that are normally protected from an application or user.
References
Vulnerable Configurations
  • cpe:2.3:a:symantec:message_gateway:9.0:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:9.0:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:9.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:9.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:9.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:9.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:9.5:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:9.5:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:9.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:9.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:9.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:9.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:9.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:9.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:9.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:9.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.0:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.0:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.5:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.5:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6.1:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6.1:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6.1-3:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6.1-3:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6.2:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6.2:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6.3:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6.3:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6.3-2:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6.3-2:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6.4:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6.4:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6.5:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.6.6:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.6.6:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:message_gateway:10.7:*:*:*:*:*:*:*
    cpe:2.3:a:symantec:message_gateway:10.7:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 24-08-2020 - 17:37)
Impact:
Exploitability:
CWE NVD-CWE-noinfo
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 108925
misc https://support.symantec.com/us/en/article.SYMSA1486.html
Last major update 24-08-2020 - 17:37
Published 11-07-2019 - 21:15
Last modified 24-08-2020 - 17:37
Back to Top