Symantec DLP Agent flaw lets local attackers escalate privileges to SYSTEM


Broadcom has patched a high-severity vulnerability in the Symantec Data Loss Prevention Agent for Windows that can let a low-privileged local attacker gain SYSTEM-level access. The flaw, tracked as CVE-2026-3991, carries a CVSS 3.1 score of 7.8 and affects multiple supported DLP branches before their fixed releases.

The issue is serious because it does not require special product configuration. Broadcom’s advisory and the CVE record both describe it as a local privilege escalation bug in the Windows endpoint component, which means an attacker who already has basic access on a machine could use it to break out of those limits and take full control of the host.

Research tied to the disclosure says the root cause sits in how OpenSSL was compiled into the agent. The vulnerable process, edpa.exe, runs with SYSTEM privileges and looks for an OpenSSL configuration file in a hardcoded development path. If a low-privileged user can create that missing path and place a malicious configuration file and DLL there, the agent may load attacker-controlled code as SYSTEM.

How the privilege escalation works

According to public reporting on the research, the vulnerable path is C:\VontuDev\workDir\openssl\output\x64\Release\SSL\. On default Windows systems, authenticated users can often create missing folders at the root of the drive, which gives an attacker a chance to recreate that path and plant a rogue openssl.cnf file.

The attack then abuses OpenSSL’s normal behavior. A crafted configuration file can point to an attacker’s DLL through the dynamic_path directive. When the Symantec DLP Agent restarts or initializes OpenSSL, it reads the malicious configuration and loads the DLL inside a trusted process that already runs as SYSTEM.

That gives the attacker a clean privilege jump without needing a kernel exploit. Because the code runs inside the trusted DLP agent process, it can also blend into normal enterprise activity more easily than a noisy standalone exploit.

Affected versions and fixed releases

Broadcom published the advisory on March 30, 2026. The company says Symantec Data Loss Prevention Windows Endpoint versions before 25.1 MP1, 16.1 MP2, 16.0 RU2 HF9, 16.0 RU1 MP1 HF12, and 16.0 MP2 HF15 are affected. Those same versions appear as the fixed or unaffected releases in the CVE record.

That means organizations do not need to guess which builds are safe. The specific fixed versions listed in the public record are 25.1.00100.60229, 16.1.00200.60431, 16.0.20009.60689, 16.0.10112.60928, and 16.0.00215.62094.

Broadcom credited security researcher Manuel Feifel with finding the flaw. CISA’s enrichment data for the CVE currently says exploitation is not known, and public reports say there is no evidence of active attacks or public exploit code so far.

What admins should do now

Organizations that run the Symantec DLP Windows agent should treat this as a patch-now issue. This is a local bug, so it is not the kind of flaw that internet scanning alone will trigger, but it becomes very valuable after phishing, insider abuse, stolen credentials, or any other foothold on a workstation or server.

Security teams should identify every DLP Windows endpoint version in use, upgrade any system below the fixed builds, and review whether low-privileged users can create suspicious root-level paths on sensitive systems. They should also look for unexpected files in the hardcoded OpenSSL path and check for recent DLP service restarts that could line up with abuse attempts. These are practical defensive steps based on the published exploit path.

The bottom line is simple. CVE-2026-3991 is not a remote wormable bug, but it is still dangerous because it can hand full SYSTEM access to anyone who already has a limited foothold on an affected Windows device. In enterprise environments, that is often enough to turn a minor intrusion into a much larger compromise.

Key facts

  • CVE-2026-3991 is a local privilege escalation flaw in Symantec Data Loss Prevention Windows Endpoint.
  • Severity is HIGH with a CVSS 3.1 base score of 7.8.
  • Fixed versions include 25.1 MP1, 16.1 MP2, 16.0 RU2 HF9, 16.0 RU1 MP1 HF12, and 16.0 MP2 HF15.
  • Broadcom published the advisory on March 30, 2026.
  • Manuel Feifel received credit for the discovery.

Version table

BranchVulnerable beforeFixed build
DLP 25.125.1 MP125.1.00100.60229
DLP 16.116.1 MP216.1.00200.60431
DLP 16.0 RU2RU2 HF916.0.20009.60689
DLP 16.0 RU1 MP1HF1216.0.10112.60928
DLP 16.0 MP2HF1516.0.00215.62094

FAQ

What is CVE-2026-3991?

It is a high-severity privilege escalation flaw in the Symantec DLP Agent for Windows that can let a low-privileged local attacker gain elevated access.

Does this bug allow remote takeover?

Public records describe it as a local vulnerability, not a remote unauthenticated bug. An attacker needs an existing foothold on the machine first.

Which process is involved in the exploit chain?

Public reporting on the research says the vulnerable SYSTEM-level process is edpa.exe, which may load attacker-controlled OpenSSL configuration data from a hardcoded path.

Is there a workaround?

Broadcom’s advisory focuses on upgrading to a fixed version. Public sources around the disclosure do not describe a vendor workaround that removes the risk without patching.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages