Описание
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
Ссылки
- ExploitThird Party Advisory
- ProductVendor Advisory
- ExploitThird Party Advisory
- ProductVendor Advisory
Уязвимые конфигурации
Конфигурация 1Версия до e86.20 (исключая)
cpe:2.3:a:checkpoint:endpoint_security:*:*:*:*:*:windows:*:*
EPSS
Процентиль: 13%
0.00044
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-427
CWE-427
Связанные уязвимости
github
около 4 лет назад
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
EPSS
Процентиль: 13%
0.00044
Низкий
7.8 High
CVSS3
7.2 High
CVSS2
Дефекты
CWE-427
CWE-427