Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry.
History

Wed, 28 Jan 2026 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Wed, 28 Jan 2026 17:00:00 +0000

Type Values Removed Values Added
Description Symantec Endpoint Protection, prior to 14.3 RU10 Patch 1, RU9 Patch 2, and RU8 Patch 3, may be susceptible to a COM Hijacking vulnerability, which is a type of issue whereby an attacker attempts to establish persistence and evade detection by hijacking COM references in the Windows Registry.
Title Component Object Model (COM) Hijacking in Symantec Endpoint Protection Windows Client
Weaknesses CWE-427
References
Metrics cvssV3_1

{'score': 5.4, 'vector': 'CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N'}


cve-icon MITRE

Status: PUBLISHED

Assigner: symantec

Published:

Updated: 2026-01-28T18:59:55.010Z

Reserved: 2025-12-02T18:57:26.118Z

Link: CVE-2025-13919

cve-icon Vulnrichment

Updated: 2026-01-28T18:50:11.401Z

cve-icon NVD

Status : Received

Published: 2026-01-28T17:16:06.493

Modified: 2026-01-28T17:16:06.493

Link: CVE-2025-13919

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.