Symantec Messaging Gateway Broadcom Symantec Messaging Gateway

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Broadcom Symantec Messaging Gateway.

By the Year

In 2025 there have been 0 vulnerabilities in Broadcom Symantec Messaging Gateway. Last year, in 2024 Symantec Messaging Gateway had 2 security vulnerabilities published. Right now, Symantec Messaging Gateway is on track to have less security vulnerabilities in 2025 than it did last year.




Year Vulnerabilities Average Score
2025 0 0.00
2024 2 9.80
2023 0 0.00
2022 1 4.90
2021 0 0.00
2020 2 6.05
2019 0 0.00
2018 0 0.00

It may take a day or so for new Symantec Messaging Gateway vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Broadcom Symantec Messaging Gateway Security Vulnerabilities

A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before

CVE-2024-23614 9.8 - Critical - January 26, 2024

A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 9.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.

Classic Buffer Overflow

A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before

CVE-2024-23615 9.8 - Critical - January 26, 2024

A buffer overflow vulnerability exists in Symantec Messaging Gateway versions 10.5 and before. A remote, anonymous attacker can exploit this vulnerability to achieve remote code execution as root.

Classic Buffer Overflow

A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers

CVE-2021-30651 4.9 - Medium - June 24, 2022

A malicious authenticated SMG administrator user can obtain passwords for external LDAP/Active Directory servers that they might not otherwise be authorized to access.

A privilege escalation flaw

CVE-2020-12594 7.2 - High - December 10, 2020

A privilege escalation flaw allows a malicious, authenticated, privileged CLI user to escalate their privileges on the system and gain full control over the SMG appliance. This affects SMG prior to 10.7.4.

Improper Privilege Management

An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server

CVE-2020-12595 4.9 - Medium - December 10, 2020

An information disclosure flaw allows a malicious, authenticated, privileged web UI user to obtain a password for a remote SCP backup server that they might not otherwise be authorized to access. This affects SMG prior to 10.7.4.

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets

CVE-2014-0160 7.5 - High - April 07, 2014

The (1) TLS and (2) DTLS implementations in OpenSSL 1.0.1 before 1.0.1g do not properly handle Heartbeat Extension packets, which allows remote attackers to obtain sensitive information from process memory via crafted packets that trigger a buffer over-read, as demonstrated by reading private keys, related to d1_both.c and t1_lib.c, aka the Heartbleed bug.

Out-of-bounds Read

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Splunk or by Broadcom? Click the Watch button to subscribe.

Broadcom
Vendor

subscribe