Vulnerability Monitor

The vendors, products, and vulnerabilities you care about
endpoint_protection Vendor: symantec

About This Product

endpoint_protection is a software product offered by symantec. This product is widely deployed in production environments, making vulnerability monitoring essential for organizations relying on it. Security vulnerabilities in products of this category can affect system availability, data confidentiality, and integrity across entire networks. The significant number of reported vulnerabilities indicates this product has received substantial security scrutiny and community focus over time. Regular assessment of known vulnerabilities and timely patching are fundamental components of responsible system administration for any deployment of this software.

Vulnerability Landscape Summary

SecUtils has identified 71 known vulnerabilities affecting symantec endpoint_protection. This includes 1 critical-severity issue and 36 high-severity issues that warrant immediate attention. Vulnerabilities in this product have been disclosed spanning from 2009 to 2020, indicating a sustained research interest and ongoing security attention. 32 medium-severity issues and 2 low-severity issues complete the vulnerability landscape. Organizations should prioritize patching based on deployment context, asset criticality, and exploitation likelihood rather than severity alone.

Known Vulnerabilities
ID Date Published Last Modified Severity (CVSSv3) Severity (CVSSv2) Exploit Available
CVE-2009-1428 2009-04-29 2026-04-23 - 4.3 Likely
CVE-2009-1429 2009-04-29 2026-04-23 - 10.0 Likely
CVE-2009-1430 2009-04-29 2026-04-23 - 9.3 Likely
CVE-2009-1431 2009-04-29 2026-04-23 - 9.3 Likely
CVE-2009-1432 2009-04-30 2026-04-23 - 5.0 Likely
CVE-2010-0106 2010-02-19 2025-04-11 - 1.9 Unknown
CVE-2010-0108 2010-02-19 2025-04-11 - 10.0 Likely
CVE-2010-0114 2010-12-22 2025-04-11 - 7.5 Likely
CVE-2010-3268 2010-12-22 2025-04-11 - 5.0 Likely
CVE-2011-0550 2011-08-15 2025-04-11 - 4.3 Likely
CVE-2011-0551 2011-08-15 2025-04-11 - 6.8 Likely
CVE-2012-1421 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1425 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1443 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1446 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1456 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1457 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1459 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1461 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-1462 2012-03-21 2025-04-11 - 4.3 Likely
CVE-2012-0289 2012-05-23 2025-04-11 - 7.2 Unknown
CVE-2012-0294 2012-05-23 2025-04-11 - 5.8 Likely
CVE-2012-0295 2012-05-23 2025-04-11 - 9.3 Likely
CVE-2012-1821 2012-05-24 2025-04-11 - 5.0 Likely
CVE-2012-4953 2012-11-14 2025-04-11 - 9.3 Likely
CVE-2012-4348 2012-12-18 2025-04-11 - 7.2 Unknown
CVE-2013-5009 2014-01-10 2025-04-11 - 7.4 Unknown
CVE-2013-5010 2014-01-10 2025-04-11 - 4.6 Unknown
CVE-2013-5011 2014-01-10 2025-04-11 - 7.2 Unknown
CVE-2014-3434 2014-08-06 2025-04-12 - 6.9 Unknown
CVE-2014-9227 2015-09-20 2025-04-12 - 4.4 Unknown
CVE-2014-9228 2015-09-20 2025-04-12 - 4.9 Unknown
CVE-2014-9229 2015-09-20 2025-04-12 - 6.5 Likely
CVE-2015-8113 2015-11-12 2025-04-12 - 7.2 Unknown
CVE-2016-2207 2016-06-30 2025-04-12 8.4 10.0 Likely
CVE-2016-2209 2016-06-30 2025-04-12 7.3 9.0 Likely
CVE-2016-2210 2016-06-30 2025-04-12 7.3 9.0 Likely
CVE-2016-2211 2016-06-30 2025-04-12 7.8 9.3 Likely
CVE-2016-3644 2016-06-30 2025-04-12 8.4 10.0 Likely
CVE-2016-3645 2016-06-30 2025-04-12 9.8 10.0 Likely
CVE-2016-3646 2016-06-30 2025-04-12 8.4 10.0 Likely
CVE-2016-5309 2017-04-14 2025-04-20 5.5 4.3 Likely
CVE-2016-5310 2017-04-14 2025-04-20 5.5 4.3 Likely
CVE-2017-13680 2017-11-06 2025-04-20 5.5 3.6 Unknown
CVE-2017-13681 2017-11-06 2025-04-20 7.8 4.6 Unknown
CVE-2017-6331 2017-11-06 2025-04-20 7.1 3.6 Unknown
CVE-2016-9093 2018-04-16 2024-11-21 7.0 6.9 Unknown
CVE-2016-9094 2018-04-16 2024-11-21 7.8 6.8 Likely
CVE-2018-5236 2018-06-20 2024-11-21 5.3 3.5 Unknown
CVE-2018-5237 2018-06-20 2024-11-21 8.8 6.5 Likely
CVE-2018-12238 2018-11-29 2024-11-21 7.8 4.6 Unknown
CVE-2018-12239 2018-11-29 2024-11-21 6.8 4.6 Unknown
CVE-2018-12245 2018-11-29 2024-11-21 7.8 6.8 Likely
CVE-2018-18369 2019-04-25 2024-11-21 7.8 6.8 Likely
CVE-2018-12244 2019-04-25 2024-11-21 6.3 6.8 Likely
CVE-2018-18366 2019-04-25 2024-11-21 6.5 2.1 Unknown
CVE-2019-12750 2019-07-31 2024-11-21 7.8 4.6 Unknown
CVE-2019-12756 2019-11-15 2024-11-21 2.3 2.1 Unknown
CVE-2019-12757 2019-11-15 2024-11-21 7.8 4.6 Unknown
CVE-2019-12758 2019-11-15 2024-11-21 6.7 7.2 Unknown
CVE-2019-18372 2019-11-15 2024-11-21 7.8 7.2 Unknown
CVE-2016-5311 2020-01-09 2024-11-21 7.8 6.9 Unknown
CVE-2020-5820 2020-02-11 2024-11-21 7.8 4.6 Unknown
CVE-2020-5821 2020-02-11 2024-11-21 7.8 4.6 Unknown
CVE-2020-5822 2020-02-11 2024-11-21 7.8 4.6 Unknown
CVE-2020-5823 2020-02-11 2024-11-21 7.8 4.6 Unknown
CVE-2020-5824 2020-02-11 2024-11-21 5.5 2.1 Unknown
CVE-2020-5825 2020-02-11 2024-11-21 5.5 3.6 Unknown
CVE-2020-5826 2020-02-11 2024-11-21 5.5 2.1 Unknown
CVE-2020-5836 2020-05-11 2024-11-21 7.8 4.4 Unknown
CVE-2020-5837 2020-05-11 2024-11-21 7.8 4.6 Unknown

How SecUtils Interprets Product Data

SecUtils normalizes and enriches National Vulnerability Database (NVD) records for symantec endpoint_protection by standardizing vendor and product identifiers, aggregating vulnerability metadata from both NVD and MITRE sources, and structuring the data for rapid analysis and asset correlation. For every vulnerability listed, we extract Common Platform Enumeration (CPE) data, Common Weakness Enumeration (CWE) classifications, CVSS severity metrics, and reference information to enable organizations to prioritize patching and risk assessment efficiently. This record contains no exploit code, proof-of-concept instructions, or attack methodologies—only defensive intelligence necessary for vulnerability management and security operations.