Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
2019-06-20T17:15:10.643
2024-11-21T04:49:56.597
Modified
CVSSv3.1: 4.4 (MEDIUM)
AV:N/AC:M/Au:S/C:N/I:N/A:P
6.8
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | checkpoint | endpoint_security_clients | < e81.00 | Yes |
Application | checkpoint | remote_access_clients | < e81.00 | Yes |
Application | checkpoint | capsule_docs | < e81.00 | Yes |