{"description":"Trending threats, MITRE ATT\u0026CK coverage, and detection metadata — refreshed continuously.","feed_url":"https://feed.craftedsignal.io/tags/dlp/","home_page_url":"https://feed.craftedsignal.io/","items":[{"_cs_actors":[],"_cs_cves":[],"_cs_exploited":false,"_cs_products":[],"_cs_severities":["medium"],"_cs_tags":["vulnerability","privilege-escalation","symantec","dlp","windows"],"_cs_type":"advisory","_cs_vendors":[],"content_html":"\u003cp\u003eCVE-2026-3991 is an elevation of privilege vulnerability affecting Symantec Data Loss Prevention (DLP) Windows Endpoint versions prior to 25.1 MP1, 16.1 MP2, 16.0 RU2 HF9, 16.0 RU1 MP1 HF12, and 16.0 MP2 HF15. A local attacker could exploit this vulnerability to gain elevated privileges on the system. This could allow them to bypass DLP policies and access sensitive data normally protected by the application. The vulnerability was reported on March 30, 2026, and affects Windows endpoints…\u003c/p\u003e\n","date_modified":"2026-03-30T19:16:27Z","date_published":"2026-03-30T19:16:27Z","id":"/briefs/2026-03-symantec-dlp-privesc/","summary":"CVE-2026-3991 is an elevation of privilege vulnerability in Symantec Data Loss Prevention (DLP) Windows Endpoint that could allow a local attacker to gain elevated access to resources.","title":"Symantec DLP Windows Endpoint Elevation of Privilege Vulnerability (CVE-2026-3991)","url":"https://feed.craftedsignal.io/briefs/2026-03-symantec-dlp-privesc/"}],"language":"en","title":"CraftedSignal Threat Feed — Dlp","version":"https://jsonfeed.org/version/1.1"}