Is Symantec Endpoint Protection vulnerable to Spring4shell CVE-2022-22965
search cancel

Is Symantec Endpoint Protection vulnerable to Spring4shell CVE-2022-22965


Article ID: 238327


Updated On:


Endpoint Protection


Researchers have found a remote code execution 0-day vulnerability (dubbed Spring4Shell and SpringShell) in the Spring Core Java framework that allows unauthenticated remote code execution. A proof of concept was leaked for a short time on Github and although promptly removed, some were able to swiftly download it. It's been reposted on various platforms, making it available to the public.


Release : 14.3 RU4


This RCE 0-day vulnerability exists in the Spring Core with the JDK version greater than or equal to 9.0. It allows an unauthenticated attacker to execute arbitrary code on the target system. The Spring Framework is a popular Java platform that provides comprehensive infrastructure support for developing Java applications.


Symantec Security Response has published the following protections based on proof of concepts (POC).


  • Hacktool 
  • Hacktool.Spring4shell


  • Audit: Spring Core Spring4Shell Activity
  • Web Attack: Spring Core Spring4Shell Activity 2 


  • Data Center Security (DCS) Intrusion Prevention (with default policies) provides zero-day protection against exploitation of the Spring4Shell vulnerability.


Note: Spring Framework versions 5.3.18 and 5.2.20, which address the vulnerability, are now available. Also temporary remediation steps were provided earlier by researchers at Praetorian.

Praetorian - Spring Core on JDK9+ is vulnerable to remote code execution

Additional Information

Symantec Protection Bulletins
Threat Alert: Spring4Shell (CVE-2022-22965) vulnerability

Symantec Security Advisory for Spring Framework CVE-2022-22965

Symantec Enterprise Blogs
Spring4Shell: New Zero-day RCE Vulnerability Uncovered in Java Framework