The Norton App Lock can be susceptible to an authentication bypass exploit. In this type of circumstance, the exploit can allow the user to kill the app to prevent it from locking the device, thereby allowing the individual to gain device access.
The issue was validated by the product team engineers. A Norton App Lock update, version 184.108.40.206, has been released which addresses the aforementioned issue. Note that the latest Symantec Norton App Lock release and patches are available to customers through the Google Play Store. At this time, Symantec is not aware of any exploitations or adverse customer impact from these issues.
Additional note: The Norton App Lock version 220.127.116.11 is fully vetted and functional on tested devices including Android OS on Samsung, Redmi, and Xiomi. However, the fix is not functional on the Lenovo K3 device due to an inherent issue in the device itself. Symantec has opened a support case for this issue and it has been confirmed from Lenovo that they are not going to provide any fix for this issue due to the age of the device. The support case can be referenced via the following link:
Symantec has confirmed that this particular issue does not affect the latest Lenovo devices.
Symantec recommends the following measures to reduce risk of attack:
Restrict access to administrative or management systems to authorized privileged users.
Restrict remote access to trusted/authorized systems only.
Run under the principle of least privilege, where possible, to limit the impact of potential exploit.
Keep all operating systems and applications current with vendor patches.
Follow a multi-layered approach to security. At a minimum, run both firewall and anti-malware applications to provide multiple points of detection and protection to both inbound and outbound threats.
Deploy network and host-based intrusion detection systems to monitor network traffic for signs of anomalous or suspicious activity. This may aid in the detection of attacks or malicious activity related to the exploitation of latent vulnerabilities.