CVE-2025-0893

7.8 HIGH

📋 TL;DR

This vulnerability allows local attackers to escalate privileges on systems running vulnerable versions of Symantec Diagnostic Tool (SymDiag). Attackers could gain elevated system privileges by exploiting improper privilege management in the diagnostic tool. Organizations using SymDiag versions before 3.0.79 are affected.

💻 Affected Systems

Products:
  • Symantec Diagnostic Tool (SymDiag)
Versions: All versions prior to 3.0.79
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: The vulnerability affects the diagnostic tool itself, not the broader Symantec/Broadcom security products. Systems where SymDiag is installed for troubleshooting purposes are vulnerable.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with local access could gain SYSTEM/root privileges, enabling complete system compromise, installation of persistent malware, credential theft, and lateral movement across the network.

🟠

Likely Case

Malicious insiders or attackers who gain initial foothold through other means could escalate privileges to bypass security controls, disable security software, and maintain persistence on compromised systems.

🟢

If Mitigated

With proper access controls and least privilege principles, impact is limited to systems where users already have local access, though successful exploitation still provides elevated privileges.

🌐 Internet-Facing: LOW - This is a local privilege escalation vulnerability requiring local access to the system, not directly exploitable over the network.
🏢 Internal Only: HIGH - Internal attackers or compromised accounts can exploit this to gain elevated privileges on workstations and servers running the vulnerable software.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local access to the system. The CWE-269 (Improper Privilege Management) suggests the tool may not properly validate or restrict privilege levels during certain operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 3.0.79 or later

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25417

Restart Required: No

Instructions:

1. Download SymDiag version 3.0.79 or later from Broadcom support portal. 2. Run the installer to update the existing installation. 3. Verify the update completed successfully by checking the version.

🔧 Temporary Workarounds

Remove SymDiag if not needed

Windows

Uninstall SymDiag from systems where it is not required for operational purposes

Control Panel > Programs and Features > Uninstall Symantec Diagnostic Tool

Restrict execution permissions

Windows

Apply strict access controls to limit who can execute SymDiag

icacls "C:\Program Files\Symantec\SymDiag\*" /deny Users:(RX)

🧯 If You Can't Patch

  • Implement strict least privilege principles - ensure users don't have administrative rights unnecessarily
  • Monitor for unusual process execution or privilege escalation attempts using endpoint detection tools

🔍 How to Verify

Check if Vulnerable:

Check SymDiag version by running the tool and viewing the version in the interface, or check installed programs in Control Panel

Check Version:

wmic product where name="Symantec Diagnostic Tool" get version

Verify Fix Applied:

Confirm SymDiag version is 3.0.79 or higher after update

📡 Detection & Monitoring

Log Indicators:

  • Windows Event Logs showing unusual process creation from SymDiag executable
  • Security logs showing privilege escalation attempts

Network Indicators:

  • Not applicable - local privilege escalation doesn't generate network traffic

SIEM Query:

Process Creation where Image contains "SymDiag" and Parent Process is not expected diagnostic tool

🔗 References

📤 Share & Export