Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Hackers Abuse Google Ads to Steal GoDaddy Manage Users ManageWP
May 7, 2026
Fake Call History Apps on Google Play Steal Payments
May 7, 2026
Malicious NuGet Packages Steal Credentials, SSH Target Browser
May 7, 2026
Home/CyberSecurity News/Symantec DLP Agent Flaw Allows Attackers to Esc Vulnerability Escalate
CyberSecurity News

Symantec DLP Agent Flaw Allows Attackers to Esc Vulnerability Escalate

A high-severity security flaw impacts the Symantec Data Loss Prevention (DLP) Agent for Windows. Tracked as CVE-2026-3991, this vulnerability allows a low-privileged local attacker to escalate their...

Emy Elsamnoudy
Emy Elsamnoudy
April 2, 2026 2 Min Read
3 0

A high-severity security flaw impacts the Symantec Data Loss Prevention (DLP) Agent for Windows.

Tracked as CVE-2026-3991, this vulnerability allows a low-privileged local attacker to escalate their system privileges to the highest level.

Security researcher Manuel Feifel discovered the flaw, and Broadcom has recently released patches to address the issue.

The vulnerability carries a CVSS score of 7.8. It requires no special configuration to exploit, meaning agents running with default settings are fully exposed.

Symantec DLP Agent Vulnerability

The core issue originates from how the OpenSSL library was compiled and integrated into the Symantec DLP Agent.

The library was built with a hardcoded configuration path pointing to a specific development directory that does not exist on standard Windows installations.

Because Windows often grants authenticated users the default permission to create missing folders at the root directory level, any low-privileged user can recreate this development path. The vulnerable process  edpa.exe runs with SYSTEM privileges.

When this process starts, it searches for its OpenSSL configuration file (openssl.cnf) at a hardcoded, attacker-controlled location.

To successfully exploit CVE-2026-3991, a threat actor with basic local access must follow a straightforward attack path.

  • The attacker creates the missing directory structure at C:VontuDevworkDiropenssloutputx64ReleaseSSL.
  • They place a malicious OpenSSL.cnf file and a payload DLL into this newly created folder.
  • The crafted configuration file uses the standard OpenSSL directive  dynamic_path to point directly to the attacker’s DLL.
  • When the Symantec DLP Agent service restarts or triggers an OpenSSL initialization, it reads the malicious configuration file.
  • The system loads the attacker’s DLL as a dynamic engine and executes it immediately with SYSTEM privileges.

Because the malicious code executes directly within the trusted DLP agent process, the attack is particularly dangerous to enterprise networks.

Threat actors can leverage this technique to bypass endpoint security protections and evade system telemetry completely.

Furthermore, attackers can use this compromised process to maintain deep, persistent access on the host machine while appearing entirely legitimate to security monitoring tools.

Affected and Patched Versions

Broadcom was first notified of the issue in November 2025 and released an official security advisory and fixes on March 30, 2026.

Organizations relying on Symantec DLP should immediately update their Windows endpoint agents to mitigate this threat.

The vulnerability affects Symantec DLP Agents before versions 16.1 MP2 or 25.1 MP1.

System administrators are strongly advised to upgrade to the following fixed versions of Data Loss Prevention (DLP): DLP 25.1 MP1, DLP 16.1 MP2, DLP 16.0 RU2 HF9, DLP 16.0 RU1 MP1 HF12, and DLP 16.0 MP2 HF15, as highlighted in the Infoguard Labs advisory.

Administrators should prioritize these patches, especially in environments where insider threats, local privilege escalation, or lateral movement are significant security concerns.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitPatchSecurityThreatVulnerability

Share Article

Emy Elsamnoudy

Emy Elsamnoudy

Emy is a cybersecurity analyst and reporter specializing in threat hunting, defense strategies, and industry trends. With expertise in proactive security measures, Emily covers the tools and techniques organizations use to detect and prevent cyber attacks. She is a regular speaker at security conferences and has contributed to industry reports on threat intelligence and security operations. Emily's reporting focuses on helping organizations improve their security posture through practical, actionable insights.

Previous Post

Starbucks Breach: Attackers Steal Attacks Allegedly

Next Post

Remcos RAT Infection Uses Obfuscated Scripts & Windows Bin

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Critical Ollama Memory Leak Exposes 300 Vulnerability Servers
May 7, 2026
Microsoft Teams Android: Join Third-Party Meetings via
May 7, 2026
ClickFix Attack Targets macOS with Fake Disk Cleanup Lures
May 7, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Jennifer sherman
Jennifer sherman
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us