Skip to main content

CVE-2025-8660: Vulnerability in Broadcom Symantec PGP Encryption

Medium
VulnerabilityCVE-2025-8660cvecve-2025-8660
Published: Mon Aug 11 2025 (08/11/2025, 07:18:08 UTC)
Source: CVE Database V5
Vendor/Project: Broadcom
Product: Symantec PGP Encryption

Description

Privilege escalation occurs when a user gets access to more resources or functionality than they are normally allowed.

AI-Powered Analysis

AILast updated: 08/11/2025, 07:48:12 UTC

Technical Analysis

CVE-2025-8660 is a medium-severity privilege escalation vulnerability identified in Broadcom's Symantec PGP Encryption product, specifically affecting version 11.0.1. Privilege escalation vulnerabilities allow an attacker to gain elevated access rights beyond their authorized permissions, potentially enabling unauthorized access to sensitive data or system functions. According to the CVSS 4.0 vector, the attack vector is network-based (AV:N), requiring high attack complexity (AC:H), and partial privileges (PR:H) with user interaction (UI:A). The vulnerability does not affect confidentiality or availability but impacts integrity (VI:H), indicating that an attacker with some level of existing privileges and user interaction can manipulate or alter system or data integrity. The vulnerability does not require system compromise or authentication beyond high privileges, and no scope change occurs, meaning the impact is confined to the vulnerable component. No known exploits are currently in the wild, and no patches or mitigations have been explicitly linked yet. The vulnerability was published on August 11, 2025, shortly after being reserved on August 6, 2025. Given that Symantec PGP Encryption is widely used for securing email and file encryption, this vulnerability could allow an attacker who already has elevated user privileges to further escalate their access, potentially undermining encryption protections and exposing sensitive communications or data.

Potential Impact

For European organizations, the impact of CVE-2025-8660 could be significant, especially for entities relying on Symantec PGP Encryption for protecting sensitive communications and data, such as government agencies, financial institutions, healthcare providers, and critical infrastructure operators. Privilege escalation could enable attackers to bypass encryption controls, modify encrypted data, or access cryptographic keys, thereby compromising data integrity and confidentiality indirectly. This could lead to data breaches, regulatory non-compliance (e.g., GDPR violations), and erosion of trust in secure communication channels. The requirement for existing high privileges and user interaction limits the attack surface but does not eliminate risk, particularly in environments where insider threats or phishing attacks are prevalent. Additionally, the medium severity suggests that while the vulnerability is not trivial, it demands timely attention to prevent exploitation in targeted attacks.

Mitigation Recommendations

Organizations should immediately inventory their deployments of Symantec PGP Encryption version 11.0.1 and prioritize upgrading to patched versions once available. In the absence of an official patch, applying strict access controls to limit users with high privileges and monitoring for unusual privilege escalation attempts is critical. Implementing robust endpoint detection and response (EDR) solutions can help identify suspicious activities related to privilege escalation. Additionally, enforcing multi-factor authentication (MFA) and minimizing user interaction requirements through user training and phishing awareness can reduce exploitation likelihood. Network segmentation to isolate systems running Symantec PGP Encryption and restricting network access to trusted hosts will further reduce exposure. Regular audits of user privileges and encryption key management policies should be conducted to ensure no unauthorized privilege accumulation occurs. Finally, organizations should maintain up-to-date threat intelligence feeds to monitor for any emerging exploits targeting this vulnerability.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
symantec
Date Reserved
2025-08-06T05:59:49.503Z
Cvss Version
4.0
State
PUBLISHED

Threat ID: 68999c95ad5a09ad00224b5a

Added to database: 8/11/2025, 7:32:37 AM

Last enriched: 8/11/2025, 7:48:12 AM

Last updated: 8/11/2025, 11:12:58 AM

Views: 6

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats