
CVE-2021-30359
https://notcve.org/view.php?id=CVE-2021-30359
22 Oct 2021 — The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during the installation. Because the MS Installer allows regular users to repair their installation, an attacker running an installer before 90.08.7405 can start the installation repair and place a specially crafted binary in the repair folder, which runs with the admin privileges. Los instaladores de Harmony Browse y SandBlast Agent for Browsers deben tener privilegios de administrador para e... • https://github.com/mandiant/Vulnerability-Disclosures/blob/master/MNDT-2021-0007/MNDT-2021-0007.md • CWE-427: Uncontrolled Search Path Element •

CVE-2021-30358
https://notcve.org/view.php?id=CVE-2021-30358
19 Oct 2021 — Mobile Access Portal Native Applications who's path is defined by the administrator with environment variables may run applications from other locations by the Mobile Access Portal Agent. Las Aplicaciones Nativas del Portal de Acceso Móvil cuya ruta está definida por el administrador con variables de entorno pueden ejecutar aplicaciones desde otras ubicaciones por el agente del portal de acceso móvil • https://supportcontent.checkpoint.com/solutions?id=sk142952 • CWE-78: Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') •

CVE-2021-30357
https://notcve.org/view.php?id=CVE-2021-30357
08 Jun 2021 — SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access. SSL Network Extender Client para Linux versiones build anteriores a 800008302, revela parte del contenido del archivo de configuración suministrado, lo que permite divulgar parcialmente archivos a los que el usuario no tenía acceso • https://github.com/joaovarelas/CVE-2021-30357_CheckPoint_SNX_VPN_PoC • CWE-209: Generation of Error Message Containing Sensitive Information •

CVE-2021-30356
https://notcve.org/view.php?id=CVE-2021-30356
22 Apr 2021 — A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files. Se reportó una vulnerabilidad de Denegación de Servicio en Check Point Identity Agent versiones anteriores a R81.018.0000, que podría permitir a usuarios poco privilegiados sobrescribir archivos protegidos del sistema • https://supportcontent.checkpoint.com/solutions?id=sk134312 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2021-3449 – NULL pointer deref in signature_algorithms processing
https://notcve.org/view.php?id=CVE-2021-3449
25 Mar 2021 — An OpenSSL TLS server may crash if sent a maliciously crafted renegotiation ClientHello message from a client. If a TLSv1.2 renegotiation ClientHello omits the signature_algorithms extension (where it was present in the initial ClientHello), but includes a signature_algorithms_cert extension then a NULL pointer dereference will result, leading to a crash and a denial of service attack. A server is only vulnerable if it has TLSv1.2 and renegotiation enabled (which is the default configuration). OpenSSL TLS c... • https://github.com/riptl/cve-2021-3449 • CWE-476: NULL Pointer Dereference •

CVE-2020-6024
https://notcve.org/view.php?id=CVE-2020-6024
20 Jan 2021 — Check Point SmartConsole before R80.10 Build 185, R80.20 Build 119, R80.30 before Build 94, R80.40 before Build 415, and R81 before Build 548 were vulnerable to a possible local privilege escalation due to running executables from a directory with write access to all authenticated users. Check Point SmartConsole versión anterior a R80.10 Build 185, versión R80.20 Build 119, versión R80.30 anterior a Build 94, versión R80.40 anterior a Build 415 y la versión R81 anterior a Build 548 eran vulnerables a una po... • https://supportcontent.checkpoint.com/solutions?id=sk142952 • CWE-114: Process Control CWE-269: Improper Privilege Management •

CVE-2020-6021
https://notcve.org/view.php?id=CVE-2020-6021
03 Dec 2020 — Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client’s privileges. Check Point Endpoint Security Client para Windows versiones anteriores a E84.20, permite un acceso de escritura al directorio desde el ... • https://supportcontent.checkpoint.com/solutions?id=sk170512 • CWE-427: Uncontrolled Search Path Element •

CVE-2020-6015
https://notcve.org/view.php?id=CVE-2020-6015
05 Nov 2020 — Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations. Check Point Endpoint Security para Windows versiones anteriores a E84.10 puede alcanzar una denegación de servicio durante la instalación limpia del cliente, lo que impedirá el almacenamiento de archivos de registro de servicio en ubicaciones no estándar • https://supportcontent.checkpoint.com/solutions?id=sk170117 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2020-6014
https://notcve.org/view.php?id=CVE-2020-6014
30 Oct 2020 — Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. Check Point Endpoint Security Client para Windows, con blades Anti-Bot o Threat Emulation instalados, antes ... • https://supportcontent.checkpoint.com/solutions?id=sk168081 • CWE-114: Process Control CWE-426: Untrusted Search Path •

CVE-2020-6023
https://notcve.org/view.php?id=CVE-2020-6023
27 Oct 2020 — Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware. Check Point ZoneAlarm versiones anteriores a 15.8.139.18543, permite a un actor local escalar privilegios mientras restaura archivos en Anti-Ransomware • https://www.zonealarm.com/software/extreme-security/release-history • CWE-426: Untrusted Search Path •