Vulnerability Monitor

The vendors, products, and vulnerabilities you care about

CVE-2012-2753


Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory.


Published

2012-06-19T20:55:07.037

Last Modified

2025-04-11T00:51:21.963

Status

Deferred

Source

[email protected]

Severity

CVSSv2: 6.9 (MEDIUM)

CVSSv2 Vector

AV:L/AC:M/Au:N/C:C/I:C/A:C

  • Access Vector: LOCAL
  • Access Complexity: MEDIUM
  • Authentication: NONE
  • Confidentiality Impact: COMPLETE
  • Integrity Impact: COMPLETE
  • Availability Impact: COMPLETE
Exploitability Score

3.4

Impact Score

10.0

Weaknesses
  • Type: Primary
    NVD-CWE-Other

Affected Vendors & Products
Type Vendor Product Version/Range Vulnerable?
Application checkpoint endpoint_connect r73 Yes
Application checkpoint endpoint_security e80 Yes
Application checkpoint endpoint_security e80.10 Yes
Application checkpoint endpoint_security e80.20 Yes
Application checkpoint endpoint_security e80.30 Yes
Application checkpoint endpoint_security r73 Yes
Application checkpoint endpoint_security_vpn r75 Yes
Application checkpoint remote_access_clients e75 Yes
Application checkpoint remote_access_clients e75.10 Yes
Application checkpoint remote_access_clients e75.20 Yes

References