Risk | Low |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2019-19546 CVE-2019-19545 CVE-2019-18381 |
CWE-ID | CWE-200 CWE-942 |
Exploitation vector | Local network |
Public exploit | N/A |
Vulnerable software Subscribe |
Norton Password Manager Client/Desktop applications / Other client software |
Vendor | Broadcom |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU23440
Risk: Low
CVSSv3.1: 3.8 [CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:H/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-19546
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to gain access to potentially sensitive information.
The vulnerability exists due to improper access restrictions. A remote authenticated attacker on local network can gain unauthorized access to sensitive information on the system.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNorton Password Manager: before 6.6.2.5
External linkshttp://support.symantec.com/us/en/article.SYMSA1499.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU23439
Risk: Low
CVSSv3.1: 3.6 [CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-19545
CWE-ID:
CWE-942 - Overly Permissive Cross-domain Whitelist
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to bypass the CORS protection mechanism.
The vulnerability exists due to incorrect processing of the "Origin" HTTP header that is supplied within HTTP request. A remote authenticated attacker on local network can supply arbitrary value via the "Origin" HTTP header, bypass implemented CORS protection mechanism and perform cross-site scripting attacks against the vulnerable application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNorton Password Manager: before 6.6.2.5
External linkshttp://support.symantec.com/us/en/article.SYMSA1499.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.
EUVDB-ID: #VU23438
Risk: Low
CVSSv3.1: 3.6 [CVSS:3.1/AV:A/AC:L/PR:H/UI:R/S:U/C:L/I:L/A:L/E:U/RL:O/RC:C]
CVE-ID: CVE-2019-18381
CWE-ID:
CWE-942 - Overly Permissive Cross-domain Whitelist
Exploit availability: No
DescriptionThe vulnerability allows a local attacker to bypass the CORS protection mechanism.
The vulnerability exists due to incorrect processing of the "Origin" HTTP header that is supplied within HTTP request. A remote authenticated attacker on local network can supply arbitrary value via the "Origin" HTTP header, bypass implemented CORS protection mechanism and perform cross-site scripting attacks against the vulnerable application.
MitigationInstall updates from vendor's website.
Vulnerable software versionsNorton Password Manager: before 6.6.2.5
External linkshttp://support.symantec.com/us/en/article.SYMSA1499.html
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote authenticated privileged user via the local network (LAN).
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.