New fixes and component versions in Symantec Endpoint Protection 14.3 RU6
search cancel

New fixes and component versions in Symantec Endpoint Protection 14.3 RU6

book

Article ID: 252699

calendar_today

Updated On:

Products

Endpoint Protection

Issue/Introduction

This document lists the new fixes and component versions in Symantec Endpoint Protection (SEP) 14.3 RU6 (14.3.9203.6000 / 14.3.9205.6000). This information supplements the information found in the Release Notes.

  • New Fixes
  • Component versions


Download the full release through the Broadcom Software Download Portal. For details, see Download the latest version of Endpoint Protection.

Resolution

Additional fixes for 14.3 RU6 Patch 3 (14.3.9280.6000)

Symantec Endpoint Protection (Windows)


Incident ID: CRE-12238
Incident Description: Intermittent ccSvcHst.exe process crash due to memory_corruption

Incident ID: CRE-14781
Incident Description: Discrepancy in firewall state between the SEP client User Interface and SEPM in some cases

Incident ID: CRE-15912
Incident Description: Client upgrade does not honor the client server communication setting to not preserve communications during the upgrade

Incident ID: CRE-15918
Incident Description: SEP client unexpectedly clears the quarantine status when it originates from on-premise EDR

Incident ID: CRE-16065
Incident Description: Extended system boot observed when Host Integrity is set to perform a high frequency of checks

Incident ID: CRE-16169
Incident Description: SEP client does not failover from Group Update Provider to SEPM when GUP is unreachable

Incident ID: CRE-16196
Incident Description: SEP client repeatedly logs that a device has been allowed, even if it has not transitioned to disabled first

Incident ID: CRE-16599
Incident Description: LiveUpdate error connection timeout observed intermittently (0x00002EE2) 

Incident ID: CRE-17053
Incident Description: Policy Target Rule returning true even though it's false

Incident ID: CRE-17218
Incident Description: Policy Target Rule rapidly switches when using ICMP DNS host criteria


Additional fixes for 14.3 RU6 Patch 2 (14.3.9265.6000)

Symantec Endpoint Protection (Windows)


Incident ID: CRE-13369
Incident Description: High CPU usage observed in Chrome.exe or Edge.exe when Intrusion Prevention is enabled

Incident ID: CRE-13910
Incident Description: Application Control does not block additional processes if an invalid entry is encountered


Additional fixes for 14.3 RU6 Refresh (14.3.9247.6000)

Symantec Endpoint Protection (Windows)


Incident ID: CRE-13714
Incident Description: SESC proxy settings are not migrated on upgrade to a newer version


Additional fixes for 14.3 RU6 Patch 1 (14.3.9225.6000)

Symantec Endpoint Protection (Windows)


Incident ID: CRE-11934
Incident Description: Unable to block USB drives that appear as a fixed disk drive to the Operating System

Incident ID: CRE-12427
Incident Description: Windows Server 2016 encounters bugcheck 0x1a on SymEFASI64.sys

Incident ID: CRE-13277
Incident Description: Cloud-managed endpoints do not retain client proxy settings during migration


New fixes for 14.3 RU6 (14.3.9205.6000)

Symantec Endpoint Protection Manager


Incident ID: CRE-7381
Incident Description: SEPM slowness and deadlocks observed after upgrading to 14.3 RU2

Incident ID: CRE-7815
Incident Description: IPS audit detections show inconsistent results in ICDm

Incident ID: CRE-7926
Incident Description: Single Risk Event email notifications contain invalid characters for Japanese

Incident ID: CRE-9157
Incident Description: Incorrect client count displayed for Out-of-date Definitions notification

Incident ID: CRE-10263
Incident Description: SEPM login intermittently is delayed up to 15 minutes

Incident ID: CRE-10360
Incident Description: SONAR, IPS, and Download Protection definitions show "Not Available" under Protection Technology view

Incident ID: CRE-10488
Incident Description: ExternalLoggingWorker exceptions found in Scm-Server-0.log

Incident ID: CRE-10852
Incident Description: SEPM upgrade may unexpectedly fail depending on the domain account used

Incident ID: CRE-10951
Incident Description: Upgrading SEPM to 14.3 RU5 incorrectly adds Threat Defense for Active Directory and Website Traffic Redirection to existing installation packages

Incident ID: CRE-10995
Incident Description: Potential SEPM upgrade failure observed during "Coalescing contents..." step

Incident ID: CRE-11259
Incident Description: Endpoint Status report shows incorrect version information if in JST time zone

Incident ID: CRE-11293
Incident Description: LiveUpdate Settings policy does not merge all settings as expected during replication

Incident ID: CRE-11415
Incident Description: Summary Report, Daily Status Report, and Virus Definition Distribution Report does not show anything when set to less than 24 hours

Incident ID: CRE-11591
Incident Description: Query Failed error when exporting Exploit Mitigation logs

 

Symantec Endpoint Protection (Windows)


Incident ID: CRE-9875
Incident Description: Event log does not match the current location of the client

Incident ID: CRE-9981
Incident Description: Get Quarantined File command from SEPM fails on files detected within archives

Incident ID: CRE-10327
Incident Description: Exceptions do not always apply properly to mounted drives on Windows Server 2019

Incident ID: CRE-10669
Incident Description: Tamper Protection incorrectly blocks LogViewer.exe from creating IFEO entries

Incident ID: CRE-10757
Incident Description: Cloud enrollment failure observed on some endpoints

Incident ID: CRE-10982
Incident Description: ClientSideClonePrepTool and smc -image command do not work as expected

Incident ID: CRE-11000
Incident Description: TDAD AD Gateway encounters an error when the ADG process token expires

Incident ID: CRE-11014
Incident Description: Upgrading a cloud-managed endpoint does not retain the assigned policy when a reboot is required

Incident ID: CRE-11366
Incident Description: .NET Mask is missing "Canonical Name" and "Created" attributes

Incident ID: CRE-11395
Incident Description: Folder exclusion list on an unmanaged client is lost when making specific configuration changes

Incident ID: CRE-11403
Incident Description: NetApp Global File Cache and SEP installed together causes Windows Server 2019 to hang

Incident ID: CRE-11524
Incident Description: Client installation fails with certain security controls in place

Incident ID: CRE-11662
Incident Description: User Interface becomes unresponsive intermittently

Incident ID: CRE-11824
Incident Description: TDAD does not synchronize DC computers when using the AD-GW agent

 

Symantec Endpoint Protection (macOS)


Incident ID: CRE-8781
Incident Description: SEPMac does not install system extension and "setup incomplete" is displayed

Incident ID: CRE-10022
Incident Description: SEPMac agent risk log is not forwarded to SEPM if the system is rebooted prior to it being uploaded


Symantec Endpoint Protection (Linux)


Incident ID: CRE-9185
Incident Description: Linux Agent uses LiveUpdate policy from previous location

Incident ID: CRE-10766
Incident Description: Error: CAF is unable to initialize libsepmadapter.so

Incident ID: CRE-10789
Incident Description: Retry logic added for log upload events that were interrupted

Incident ID: CRE-11257
Incident Description: User Interface shows "Disabled by user" even though it should say "Disabled by admin"

Incident ID: CRE-11634
Incident Description: Linux agents in a group with multiple locations to not correctly apply default location settings

Incident ID: CRE-12068
Incident Description: Intermittent kernel panic observed with sisap and sisevt on RHEL 7.9

Incident ID: CRE-12776
Incident Description: Linux agent does not list quarantine items when using the -l command

Incident ID: CRE-12809
Incident Description: Intermittent high CPU utilization observed from sisidsdaemon when EDR is enabled

 

Component Versions

The build number for this release is 14.3.9205.6000. 

Red text indicates components that have updated for this release.

Component

DLL File

DLL Version

SYS File

SYS Version

AutoProtect

srtsp64.dll

16.1.1.123

srtsp64.sys

16.1.1.123

BASH Defs

BHEngine.dll

Seq#= 20220421.021

12.6.0.106

BHDrvx64.sys

12.6.0.106

BASH Framework

BHClient.dll

12.6.0.106

N/A

-

CC

ccLib.dll

17.3.2.16

ccSetx64.sys

17.3.0.48

CIDS Defs

IDSxpx86.dll

Seq#= 20220525.091

17.2.10.9

IDSviA64.sys

17.2.10.7

CIDS Framework

IDSAux.dll

17.2.10.7

N/A

-

CP3

version.txt

3.2.0.322

N/A

-

CX

cx_lib.dll

4.0.5.7

N/A

-

ConMan

version.txt

3.3.6.85

N/A

-

D2D

version.txt

1.5.0.81

N/A

-

DefUtils

DefUtDCD.dll

5.5.0.19

N/A

-

DuLuCallback

DuLuCbk.dll

1.13.2.2

N/A

-

ERASER

cceraser.dll

119.1.5.1

eraser64.sys

119.1.5.1

IRON

Iron.dll

9.2.1.34

Ironx64.sys

9.2.1.32

LUX

Lux.dll

4.2.2.24

   

LiveUpdate

LUEng.dll

2.9.1.14

N/A

-

MicroDefs

patch25d.dll

6.2.4.13

N/A

-

SDS Engine

sds_engine_x86.dll

Seq#= 20221021.004

1.19.0.73

N/A

-

SEF Defs

speng32.dll

1.9.0.1009

symevnt32.sys

1.9.0.987

SIS

SIS.dll

14.3.21017.5000

N/A

-

STIC Defs

stic.dll

Seq#= 20220610.001

3.6.4.538

N/A

-

STIC Framework

sticprxy.dll

3.6.4.538

 

 

SymDS

DSCli.dll

6.8.1.39

N/A

-

SymEFA

EFACli64.dll

7.5.1.46

SymEFASI64.sys

7.5.1.43

SymELAM

ELAMCli.dll

2.5.0.58

SymELAM.sys

2.5.0.54

SymEvent

Sevntx64.exe

14.0.9.53

SymEvent.sys

14.0.9.53

SymNetDrv

SNDSvc.dll

17.2.0.165

symnets.sys

17.2.0.165

SymScan

ccScanW.dll

16.4.1.23

N/A

-

SymVT

version.txt

10.2.1.10

N/A

-