
CVE-2019-8463
https://notcve.org/view.php?id=CVE-2019-8463
23 Dec 2019 — A denial of service vulnerability was reported in Check Point Endpoint Security Client for Windows before E82.10, that could allow service log file to be written to non-standard locations. Se reportó una vulnerabilidad de denegación de servicio en Check Point Endpoint Security Client para Windows versiones anteriores a E82.10, que podría permitir que un archivo de registro de servicio sea escrito en ubicaciones no estándar. • https://supportcontent.checkpoint.com/solutions?id=sk163578 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVE-2019-8462
https://notcve.org/view.php?id=CVE-2019-8462
02 Oct 2019 — In a rare scenario, Check Point R80.30 Security Gateway before JHF Take 50 managed by Check Point R80.30 Management crashes with a unique configuration of enhanced logging. En un escenario extraño, Check Point R80.30 Security Gateway anterior a JHF Take 50 administrada por Check Point R80.30 Management, se bloquea con una configuración única de registro mejorado. • https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk153152 • CWE-755: Improper Handling of Exceptional Conditions •

CVE-2019-8461
https://notcve.org/view.php?id=CVE-2019-8461
29 Aug 2019 — Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user. Check Point Endpoint Security Initial Client para Windows versión anterior a E81.30, intenta cargar una biblioteca DLL localizada en cualquier ubicación de RUTA (PATH) en una imagen limp... • https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM • CWE-114: Process Control CWE-426: Untrusted Search Path •

CVE-2019-8459
https://notcve.org/view.php?id=CVE-2019-8459
20 Jun 2019 — Check Point Endpoint Security Client for Windows, with the VPN blade, before version E80.83, starts a process without using quotes in the path. This can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one. Check Point Endpoint Security Client para Windows, con el VPN blade, anterior a versión E80.83, inicia un proceso sin usar comillas en la ruta (path). Esto puede causar la carga de un ejecutable previamente colocado con un nombre simila... • https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk124972#Resolved%20Issues • CWE-428: Unquoted Search Path or Element •

CVE-2019-8458
https://notcve.org/view.php?id=CVE-2019-8458
20 Jun 2019 — Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. Check Point Endpoint Security Client para Windows, con Anti-Malware blade instalado, anterior a versión E81.00, intenta car... • https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk153053 • CWE-114: Process Control •

CVE-2019-8454
https://notcve.org/view.php?id=CVE-2019-8454
29 Apr 2019 — A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system. Un atacante local puede crear un enlace físico entre un archivo en el cual el cliente para Windows de Check Point Endpoint Security escribe, en versiones anteriores a E80.96, y otro archivo BAT, y luego, haciéndo... • https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk150012 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-65: Windows Hard Link •

CVE-2019-8452 – CheckPoint Endpoint Security Client/ZoneAlarm 15.4.062.17802 - Privilege Escalation
https://notcve.org/view.php?id=CVE-2019-8452
22 Apr 2019 — A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file. Un enlace físico creado desde el archivo log file de Check Point ZoneAlarm hasta la versión 15.4.062 o el cliente de Check Point Endpoint Security para Windows ant... • https://packetstorm.news/files/id/154754 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-65: Windows Hard Link •

CVE-2019-8453
https://notcve.org/view.php?id=CVE-2019-8453
17 Apr 2019 — Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions. This can allow a local attacker to replace a DLL file with a malicious one and cause Denial of Service to the client. Algunos de los archivos DLL cargados por ZoneAlarm de Check Point hasta la versión 15.4.062 se toman de directorios donde todos los usuarios tienen permisos de escritura. Esto puede permitir a un atacante local reemplazar un archivo DLL por uno malicioso y causar... • http://www.securityfocus.com/bid/108029 • CWE-114: Process Control CWE-426: Untrusted Search Path •

CVE-2019-8455
https://notcve.org/view.php?id=CVE-2019-8455
17 Apr 2019 — A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file. Un enlace físico creado a partir del archivo de registro de Check Point ZoneAlarm versión hasta 15.4.062, cualquier archivo en el sistema cambiará su permiso para que todos los usuarios puedan acceder a ese archivo vinculado. Hacer e... • http://www.securityfocus.com/bid/108029 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-65: Windows Hard Link •

CVE-2019-8456
https://notcve.org/view.php?id=CVE-2019-8456
09 Apr 2019 — Check Point IKEv2 IPsec VPN up to R80.30, in some less common conditions, may allow an attacker with knowledge of the internal configuration and setup to successfully connect to a site-to-site VPN server. Check Point IKEv2 IPsec VPN versión hasta R80.30, en algunas condiciones menos comunes, puede permitir que un atacante con conocimiento de la configuración y configuración internas se conecte con éxito a un servidor VPN site-to-site. • https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk149892 • CWE-284: Improper Access Control •