{"id":116,"date":"2020-04-27T10:06:02","date_gmt":"2020-04-27T10:06:02","guid":{"rendered":"http:\/\/labs.redyops.com\/?p=116"},"modified":"2020-07-14T12:08:35","modified_gmt":"2020-07-14T12:08:35","slug":"symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write","status":"publish","type":"post","link":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/","title":{"rendered":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837)"},"content":{"rendered":"<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/\" data-a2a-title=\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837)\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Summary<\/strong><\/h1>\n\n\n\n<p><strong>Assigned CVE<\/strong>: <em>CVE-2020-5837<\/em> has been assigned and RedyOps Labs has been publicly acknowledged by the vendor.<\/p>\n\n\n\n<p><strong>Known to Neurosoft&#8217;s RedyOps Labs since<\/strong>: 22\/12\/2019<\/p>\n\n\n\n<p><strong>Exploit<\/strong> <strong>Code<\/strong>: <a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/RedyOpsResearchLabs\/SEP-14.2-Arbitrary-Write\" target=\"_blank\">https:\/\/github.com\/RedyOpsResearchLabs\/SEP-14.2-Arbitrary-Write<\/a> <\/p>\n\n\n\n<p><strong>Vendor&#8217;s Advisory<\/strong>: <a href=\"https:\/\/support.broadcom.com\/security-advisory\/security-advisory-detail.html?notificationId=SYMSA1762\">https:\/\/support.broadcom.com\/security-advisory\/security-advisory-detail.html?notificationId=SYMSA1762<\/a><\/p>\n\n\n\n<p>An Elevation of Privilege (EoP) exists in SEP 14.2 RU2 . The latest version we tested is  SEP Version 14(14.2 RU2 MP1) build 5569 (14.2.5569.2100). The exploitation of this EoP ,  gives the ability to a low privileged user to create a file anywhere in the system. The attacker partially controls the content of the file. There are many ways to abuse this issue. We chose to create a bat file in the Users Startup folder C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\backdoor.bat   because we believe it is a good opportunity to present an interesting method we used, in order to bypass restrictions of this arbitrary write where we could control only partially the content .<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Description<\/strong><\/h1>\n\n\n\n<p>Whenever Symantec Endpoint Protection (SEP) performs a scan, it uses high privileges in order to create a log file under the folder<\/p>\n\n\n\n<p>C:\\Users\\user\\AppData\\Local\\Symantec\\Symantec Endpoint Protection\\Logs\\<\/p>\n\n\n\n<p>An attacker can create a SymLink in order to write this file anywhere in the system. As for example the following steps will force SEP to create the log file under the <\/p>\n\n\n\n<p>&#8220;C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\backdoor.bat&#8221;<\/p>\n\n\n\n<ol><li>Delete the &#8220;Logs&#8221; sub folder (Shift+Delete) from the &nbsp;&#8220;C:\\Users\\attacker\\AppData\\Local\\Symantec\\Symantec Endpoint Protection\\&#8221; folder. &nbsp;<\/li><li>Execute the following:<\/li><\/ol>\n\n\n\n<pre class=\"wp-block-code\"><code>CreateSymlink.exe \"C:\\Users\\attacker\\AppData\\Local\\Symantec\\Symantec Endpoint Protection\\Logs\\12222019.Log\" \"C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\backdoor.bat\"<\/code><\/pre>\n\n\n\n<p><em><strong>Note<\/strong>: The file 12222019.Log is in format mmddyyyy.log . Depending on the day you exploit, you have to choose the right name.<\/em><\/p>\n\n\n\n<p>CreateSymlink is opensource and can be found in the following URL: <a href=\"https:\/\/github.com\/googleprojectzero\/symboliclink-testing-tools\/releases\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/github.com\/googleprojectzero\/symboliclink-testing-tools\/releases<\/a>&nbsp;.<\/p>\n\n\n\n<p>The log files contain data which are partially controlled by the attacker, allowing commands to be injected into the log files. With symbolic links, we can write log files in other file formats which can lead to an EoP.<\/p>\n\n\n\n<p>An easy way to inject code in the log files, is by naming a malicious file to<\/p>\n\n\n\n<p>m&amp;<strong>command<\/strong>&amp;sf.exe <\/p>\n\n\n\n<p>and scan it. This will trigger the scan and a log entry with the injected command will be created. This is caused because the filename &#8220;m&amp;<strong>command<\/strong>&amp;sf.exe&#8221; of the malicious file is being referenced in the log files. Combining this with the SymLinks, the attacker can create the valid bat file &nbsp;&#8220;C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\backdoor.bat&#8221; .<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Exploitation<\/strong><\/h1>\n\n\n\n<p>In order to Exploit the issue you can use our exploit from our <a href=\"https:\/\/github.com\/RedyOpsResearchLabs\/SEP-14.2-Arbitrary-Write\" target=\"_blank\" rel=\"noreferrer noopener\">GitHub<\/a> . <\/p>\n\n\n\n<p>In the following paragraph a step by step explanation of the Video PoC where we use the exploit, is provided.<\/p>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Video PoC Step By Step<\/strong><\/h1>\n\n\n\n<p>The exploit takes 2 arguments. The first argument is the file we want the logs to be written in. The second argument, is the payload we want to inject in the logs file. If you can recall, the &#8220;payload&#8221; we are going to inject is nothing more than the filename of the malicious file which we are going to scan. So the following command will cause the SEP to create its log file to <\/p>\n\n\n\n<p>c:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\backdoor.bat<\/p>\n\n\n\n<p>and the malicious file we are going to scan, will have the name <\/p>\n\n\n\n<p>&#8220;&amp; powershell.exe -Enc YwBtAGQALgBlAHgAZQAgAC8AQwAgAEMAOgBcAFUAcwBlAHIAcwBcAFAAdQBiAGwAaQBjAFwAMQAuAGUAeABlAA== &amp; REM&#8221;<\/p>\n\n\n\n<p>Yes i know&#8230; this is a strange name for a file, but it is what it is \ud83d\ude42<\/p>\n\n\n\n<pre class=\"wp-block-code\"><code>Exploit.exe \"c:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\backdoor.bat\" \"&amp; powershell.exe -Enc YwBtAGQALgBlAHgAZQAgAC8AQwAgAEMAOgBcAFUAcwBlAHIAcwBcAFAAdQBiAGwAaQBjAFwAMQAuAGUAeABlAA== &amp; REM\"<\/code><\/pre>\n\n\n\n<p>If you decode the base64 you will have the command <strong>cmd.exe \/C C:\\Users\\Public\\1.exe<\/strong><\/p>\n\n\n\n<p>A user with low privileges can copy any file under the C:\\Users\\Public\\ folder.  <\/p>\n\n\n\n<figure class=\"wp-block-embed-youtube wp-block-embed is-type-video is-provider-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<iframe loading=\"lazy\" title=\"SEP PoC\" width=\"525\" height=\"295\" src=\"https:\/\/www.youtube.com\/embed\/QIjzMQF-gbw?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe>\n<\/div><\/figure>\n\n\n\n<hr class=\"wp-block-separator\"\/>\n\n\n\n<p>00:00 &#8211; 00:43: We present the environment; a user with low privileges, the windows version, the SEP version and the DACL of the &#8220;StartUp&#8221; folder.<\/p>\n\n\n\n<p>00:43 &#8211; 01:18: We run the exploit. The file backdoor.bat is created and its content contains our payload.<\/p>\n\n\n\n<p>01:18 &#8211; 01:48: We copy the calculator to <strong>C:\\Users\\Public\\1.exe<\/strong> . The payload will execute anything in <strong>C:\\Users\\Public\\1.exe<\/strong> . We copied the calculator for the PoC, but you can put any executable you want.<\/p>\n\n\n\n<p>01:48 &#8211; end: When a user logs into the system (an administrator in the PoC), the file c:\\ProgramData\\Microsoft\\Windows\\Start Menu\\Programs\\StartUp\\backdoor.bat is executed. This file contains lines of content, which are not valid commands. However, our payload is a valid command and it will be executed. As result powershell will execute the <strong>cmd.exe \/C C:\\Users\\Public\\1.exe<\/strong> and the calculator (1.exe) pops up.<\/p>\n\n\n\n<p>It is worth mentioning, that we can also write to files which already exist. As for example we can write the contents of the log files in the C:\\windows\\win.ini file.  This is useful if you want to delete a file. Name your malicious file, with a malicious filename and the AV will do the rest for you \ud83d\ude42 . <\/p>\n\n\n<div class=\"addtoany_shortcode\"><div class=\"a2a_kit a2a_kit_size_32 addtoany_list\" data-a2a-url=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/\" data-a2a-title=\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837)\"><a class=\"a2a_button_copy_link\" href=\"https:\/\/www.addtoany.com\/add_to\/copy_link?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Copy Link\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_twitter\" href=\"https:\/\/www.addtoany.com\/add_to\/twitter?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Twitter\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Facebook\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_linkedin\" href=\"https:\/\/www.addtoany.com\/add_to\/linkedin?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"LinkedIn\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_whatsapp\" href=\"https:\/\/www.addtoany.com\/add_to\/whatsapp?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"WhatsApp\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_viber\" href=\"https:\/\/www.addtoany.com\/add_to\/viber?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Viber\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_facebook_messenger\" href=\"https:\/\/www.addtoany.com\/add_to\/facebook_messenger?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Messenger\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_telegram\" href=\"https:\/\/www.addtoany.com\/add_to\/telegram?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Telegram\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_skype\" href=\"https:\/\/www.addtoany.com\/add_to\/skype?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Skype\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_button_sms\" href=\"https:\/\/www.addtoany.com\/add_to\/sms?linkurl=https%3A%2F%2Flabs.redyops.com%2Findex.php%2F2020%2F04%2F27%2Fsymantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write%2F&amp;linkname=Symantec%20Endpoint%20Protection%20%28SEP%29%2014.2%20RU2%20Elevation%20of%20Privileges%20%28CVE-2020-5837%29\" title=\"Message\" rel=\"nofollow noopener\" target=\"_blank\"><\/a><a class=\"a2a_dd addtoany_share_save addtoany_share\" href=\"https:\/\/www.addtoany.com\/share\"><\/a><\/div><\/div>\n\n\n\n<h1 class=\"wp-block-heading\"><strong>Resources<\/strong><\/h1>\n\n\n\n<p><strong>GitHub<\/strong><\/p>\n\n\n\n<p>You can find the exploit code in our GitHub at&nbsp;<a rel=\"noreferrer noopener\" href=\"https:\/\/github.com\/RedyOpsResearchLabs\/SEP-14.2-Arbitrary-Write\" target=\"_blank\">https:\/\/github.com\/RedyOpsResearchLabs\/SEP-14.2-Arbitrary-Write<\/a> <\/p>\n\n\n\n<p><strong>RedyOps team<\/strong><\/p>\n\n\n\n<p>RedyOps team, uses the 0-day exploits produced by Research Labs, before vendor releases any patch. They use it in special engagements and only for specific customers.<\/p>\n\n\n\n<p>You can find RedyOps team at&nbsp;<a href=\"https:\/\/redyops.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/redyops.com\/<\/a><\/p>\n\n\n\n<p><strong>Angel<\/strong><\/p>\n\n\n\n<p>Discovered 0-days which affect marine sector, are being contacted with the Angel Team. ANGEL has been designed and developed to meet the unique and diverse requirements of the merchant marine sector. It secures the vessel\u2019s business, IoT and crew networks by providing oversight, security threat alerting and control of the vessel\u2019s entire network.<\/p>\n\n\n\n<p>You can find Angel team at&nbsp;<a href=\"https:\/\/angelcyber.gr\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/angelcyber.gr\/<\/a><\/p>\n\n\n\n<p><strong>Illicium<\/strong><\/p>\n\n\n\n<p>Our 0-days cannot win Illicium. Today\u2019s information technology landscape is threatened by modern adversary security attacks, including 0-day exploits, polymorphic malwares, APTs and targeted attacks. These threats cannot be identified and mitigated using classic detection and prevention technologies; they can mimic valid user activity, do not have a signature, and do not occur in patterns. In response to attackers\u2019 evolution, defenders now have a new kind of weapon in their arsenal: Deception.<\/p>\n\n\n\n<p>You can find Illicium team at&nbsp;<a href=\"https:\/\/deceivewithillicium.com\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/deceivewithillicium.com\/<\/a><\/p>\n\n\n\n<p><strong>Neutrify<\/strong><\/p>\n\n\n\n<p>Discovered 0-days are being contacted to the Neutrify team, in order to develop related detection rules. Neutrify is Neurosoft\u2019s 24\u00d77 Security Operations Center, completely dedicated to threats monitoring and attacks detection. Beyond just monitoring, Neutrify offers additional capabilities including advanced forensic analysis and malware reverse engineering to analyze incidents.<\/p>\n\n\n\n<p>You can find Neutrify team at&nbsp;<a href=\"https:\/\/neurosoft.gr\/contact\/\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/neurosoft.gr\/contact\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Summary Assigned CVE: CVE-2020-5837 has been assigned and RedyOps Labs has been publicly acknowledged by the vendor. Known to Neurosoft&#8217;s RedyOps Labs since: 22\/12\/2019 Exploit Code: https:\/\/github.com\/RedyOpsResearchLabs\/SEP-14.2-Arbitrary-Write Vendor&#8217;s Advisory: https:\/\/support.broadcom.com\/security-advisory\/security-advisory-detail.html?notificationId=SYMSA1762 An Elevation of Privilege (EoP) exists in SEP 14.2 RU2 . The latest version we tested is SEP Version 14(14.2 RU2 MP1) build 5569 (14.2.5569.2100). &hellip; <\/p>\n<p class=\"link-more\"><a href=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837)&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[17,4],"tags":[22,3,8,9],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v22.7 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837) - REDYOPS Labs<\/title>\n<meta name=\"description\" content=\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges via Arbitrary Write (CVE-2020-5837) writeup.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837) - REDYOPS Labs\" \/>\n<meta property=\"og:description\" content=\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges via Arbitrary Write (CVE-2020-5837) writeup.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/\" \/>\n<meta property=\"og:site_name\" content=\"REDYOPS Labs\" \/>\n<meta property=\"article:published_time\" content=\"2020-04-27T10:06:02+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2020-07-14T12:08:35+00:00\" \/>\n<meta name=\"author\" content=\"admin\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837)\" \/>\n<meta name=\"twitter:description\" content=\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges via Arbitrary Write (CVE-2020-5837)\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/04\/SEP.png\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"admin\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/\",\"url\":\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/\",\"name\":\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837) - REDYOPS Labs\",\"isPartOf\":{\"@id\":\"https:\/\/labs.redyops.com\/#website\"},\"datePublished\":\"2020-04-27T10:06:02+00:00\",\"dateModified\":\"2020-07-14T12:08:35+00:00\",\"author\":{\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\"},\"description\":\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges via Arbitrary Write (CVE-2020-5837) writeup.\",\"breadcrumb\":{\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/labs.redyops.com\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837)\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/labs.redyops.com\/#website\",\"url\":\"https:\/\/labs.redyops.com\/\",\"name\":\"REDYOPS Labs\",\"description\":\"Blog\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/labs.redyops.com\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69\",\"name\":\"admin\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g\",\"caption\":\"admin\"},\"sameAs\":[\"http:\/\/labs.redyops.com\"],\"url\":\"https:\/\/labs.redyops.com\/index.php\/author\/admin\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837) - REDYOPS Labs","description":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges via Arbitrary Write (CVE-2020-5837) writeup.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/","og_locale":"en_US","og_type":"article","og_title":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837) - REDYOPS Labs","og_description":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges via Arbitrary Write (CVE-2020-5837) writeup.","og_url":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/","og_site_name":"REDYOPS Labs","article_published_time":"2020-04-27T10:06:02+00:00","article_modified_time":"2020-07-14T12:08:35+00:00","author":"admin","twitter_card":"summary_large_image","twitter_title":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837)","twitter_description":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges via Arbitrary Write (CVE-2020-5837)","twitter_image":"https:\/\/labs.redyops.com\/wp-content\/uploads\/2020\/04\/SEP.png","twitter_misc":{"Written by":"admin","Est. reading time":"6 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/","url":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/","name":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837) - REDYOPS Labs","isPartOf":{"@id":"https:\/\/labs.redyops.com\/#website"},"datePublished":"2020-04-27T10:06:02+00:00","dateModified":"2020-07-14T12:08:35+00:00","author":{"@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69"},"description":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges via Arbitrary Write (CVE-2020-5837) writeup.","breadcrumb":{"@id":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/labs.redyops.com\/index.php\/2020\/04\/27\/symantec-endpoint-protection-sep-14-2-eop-via-arbitrary-write\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/labs.redyops.com\/"},{"@type":"ListItem","position":2,"name":"Symantec Endpoint Protection (SEP) 14.2 RU2 Elevation of Privileges (CVE-2020-5837)"}]},{"@type":"WebSite","@id":"https:\/\/labs.redyops.com\/#website","url":"https:\/\/labs.redyops.com\/","name":"REDYOPS Labs","description":"Blog","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/labs.redyops.com\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/b71c37b49c3ccdc96f0095d5e4161b69","name":"admin","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/labs.redyops.com\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/c7bde3be8234c04475e6f42bb697f356?s=96&d=mm&r=g","caption":"admin"},"sameAs":["http:\/\/labs.redyops.com"],"url":"https:\/\/labs.redyops.com\/index.php\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/116"}],"collection":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/comments?post=116"}],"version-history":[{"count":19,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/116\/revisions"}],"predecessor-version":[{"id":192,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/posts\/116\/revisions\/192"}],"wp:attachment":[{"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/media?parent=116"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/categories?post=116"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/labs.redyops.com\/index.php\/wp-json\/wp\/v2\/tags?post=116"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}