CVE-2022-41604
https://notcve.org/view.php?id=CVE-2022-41604
Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM. Check Point ZoneAlarm Extreme Security versiones anteriores a 15.8.211.19229, permite a usuarios locales escalar privilegios. Esto ocurre debido a una debilidad de los permisos para el directorio %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates, y una omisión del controlador de autoprotección que permite la creación de un directorio de unión. • https://github.com/Wh04m1001/ZoneAlarmEoP https://www.infigo.hr/en/insights/39/elevation-of-privilege-in-zonealarm-extreme-security https://www.zonealarm.com/software/extreme-security/release-history • CWE-269: Improper Privilege Management •
CVE-2022-23743
https://notcve.org/view.php?id=CVE-2022-23743
Check Point ZoneAlarm before version 15.8.200.19118 allows a local actor to escalate privileges during the upgrade process. In addition, weak permissions in the ProgramData\CheckPoint\ZoneAlarm\Data\Updates directory allow a local attacker the ability to execute an arbitrary file write, leading to execution of code as local system, in ZoneAlarm versions before v15.8.211.192119 Check Point ZoneAlarm versiones anteriores a 15.8.200.19118, permite a un actor local escalar privilegios durante el proceso de actualización • https://www.zonealarm.com/software/extreme-security/release-history • CWE-269: Improper Privilege Management CWE-732: Incorrect Permission Assignment for Critical Resource •
CVE-2020-6023
https://notcve.org/view.php?id=CVE-2020-6023
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware. Check Point ZoneAlarm versiones anteriores a 15.8.139.18543, permite a un actor local escalar privilegios mientras restaura archivos en Anti-Ransomware • https://www.zonealarm.com/software/extreme-security/release-history • CWE-426: Untrusted Search Path •
CVE-2020-6022
https://notcve.org/view.php?id=CVE-2020-6022
Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware. Check Point ZoneAlarm versiones anteriores a 15.8.139.18543, permite a un actor local eliminar archivos arbitrarios mientras restaura archivos en Anti-Ransomware • https://www.zonealarm.com/software/extreme-security/release-history • CWE-275: Permission Issues •
CVE-2020-6012
https://notcve.org/view.php?id=CVE-2020-6012
ZoneAlarm Anti-Ransomware before version 1.0.713 copies files for the report from a directory with low privileges. A sophisticated timed attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links. This allows an unprivileged user to enable escalation of privilege via local access. ZoneAlarm Anti-Ransomware versiones anteriores a 1.0.713, copia archivos para el reporte desde un directorio con pocos privilegios. Un atacante sofisticado y cronometrado puede reemplazar esos archivos con contenido malicioso o vinculado, tal y como la explotación de CVE-2020-0896 en sistemas sin parches o usando enlaces simbólicos. • https://danishcyberdefence.dk/blog/zonealarm-check-point https://www.zonealarm.com/anti-ransomware/release-history https://www.zonealarm.com/software/extreme-security/release-history • CWE-59: Improper Link Resolution Before File Access ('Link Following') •