CVE-2023-28134
- EPSS 0.04%
- Published 12.11.2023 23:15:09
- Last modified 21.11.2024 07:54:28
Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulner...
CVE-2023-28133
- EPSS 1.84%
- Published 23.07.2023 10:15:09
- Last modified 21.11.2024 07:54:28
Local privilege escalation in Check Point Endpoint Security Client (version E87.30) via crafted OpenSSL configuration file
CVE-2022-23744
- EPSS 0.12%
- Published 07.07.2022 16:15:09
- Last modified 21.11.2024 06:49:13
Check Point Endpoint before version E86.50 failed to protect against specific registry change which allowed to disable endpoint protection by a local administrator.
CVE-2022-23742
- EPSS 0.09%
- Published 12.05.2022 20:15:15
- Last modified 21.11.2024 06:49:13
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-089...
CVE-2021-30360
- EPSS 0.04%
- Published 10.01.2022 14:10:17
- Last modified 21.11.2024 06:03:56
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs...
CVE-2020-6021
- EPSS 0.06%
- Published 03.12.2020 14:15:11
- Last modified 21.11.2024 05:34:59
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the in...
CVE-2020-6015
- EPSS 0.06%
- Published 05.11.2020 20:15:18
- Last modified 21.11.2024 05:34:59
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations.
CVE-2020-6014
- EPSS 0.11%
- Published 02.11.2020 21:15:34
- Last modified 21.11.2024 05:34:59
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage t...
CVE-2019-8461
- EPSS 0.16%
- Published 29.08.2019 21:15:11
- Last modified 21.11.2024 04:49:56
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL...
- EPSS 0.03%
- Published 29.04.2019 16:29:01
- Last modified 21.11.2024 04:49:56
A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file ...