
An authorized but less-privileged user could potentially include arbitrary code in authorized logging scripts. The management console for SEPM contained a cross-site request forgery vulnerability that was the result of an insufficient security check in SEPM. SEP Client security mitigations can potentially be bypassed allowing arbitrary code execution on a targeted client. Symantec Endpoint Protection (SEP) was susceptible to a number of security findings that could potentially result in an authorized but less privileged user gaining elevated access to the Management Console. Security Advisories Relating to Symantec Products – Symantec Endpoint Protection Multiple Security Issues The Symantec update will be available in the Software section at the top left of the screen.

To install the updated version of Symantec, please visit:, and click Ask NYU IT.


This update address the security vulnerabilities detailed below. We recommend that you update your install of Symantec Endpoint Protection (anti-virus software) to the recent version (March 2016 update, 12.1.6).
