Page 6 of 119 results (0.005 seconds)

CVSS: 8.8EPSS: 0%CPEs: 1EXPL: 0

ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems. Los productos ZoneAlarm Firewall y Antivirus anteriores a versión 15.8.109.18436, permiten a un atacante que ya posee acceso al sistema ejecutar código con privilegios elevados por medio de una combinación de manipulación de permisos de archivos y explotación de Windows CVE-2020-00896 en sistemas sin parches This vulnerability allows local attackers to escalate privileges on affected installations of Check Point ZoneAlarm. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the ZoneAlarm Service. The issue results from the lack of proper validation of a user-supplied symbolic link prior to using it in file operations. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of SYSTEM. • https://www.zonealarm.com/software/extreme-security/release-history • CWE-65: Windows Hard Link CWE-269: Improper Privilege Management •

CVSS: 7.5EPSS: 0%CPEs: 1EXPL: 0

A denial of service vulnerability was reported in Check Point Endpoint Security Client for Windows before E82.10, that could allow service log file to be written to non-standard locations. Se reportó una vulnerabilidad de denegación de servicio en Check Point Endpoint Security Client para Windows versiones anteriores a E82.10, que podría permitir que un archivo de registro de servicio sea escrito en ubicaciones no estándar. • https://supportcontent.checkpoint.com/solutions?id=sk163578 • CWE-59: Improper Link Resolution Before File Access ('Link Following') •

CVSS: 7.5EPSS: 0%CPEs: 2EXPL: 0

In a rare scenario, Check Point R80.30 Security Gateway before JHF Take 50 managed by Check Point R80.30 Management crashes with a unique configuration of enhanced logging. En un escenario extraño, Check Point R80.30 Security Gateway anterior a JHF Take 50 administrada por Check Point R80.30 Management, se bloquea con una configuración única de registro mejorado. • https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk153152 https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk161812 • CWE-755: Improper Handling of Exceptional Conditions •

CVSS: 7.8EPSS: 0%CPEs: 3EXPL: 1

Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user. Check Point Endpoint Security Initial Client para Windows versión anterior a E81.30, intenta cargar una biblioteca DLL localizada en cualquier ubicación de RUTA (PATH) en una imagen limpia sin el Endpoint Client instalado. Un atacante puede aprovechar esto para conseguir LPE usando una DLL especialmente diseñada localizada en cualquier ubicación de RUTA (PATH) accesible con permisos de escritura para el usuario. • https://safebreach.com/Post/Check-Point-Endpoint-Security-Initial-Client-for-Windows-Privilege-Escalation-to-SYSTEM https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk160812 • CWE-114: Process Control CWE-426: Untrusted Search Path •

CVSS: 9.8EPSS: 0%CPEs: 7EXPL: 0

Check Point Endpoint Security Client for Windows, with the VPN blade, before version E80.83, starts a process without using quotes in the path. This can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one. Check Point Endpoint Security Client para Windows, con el VPN blade, anterior a versión E80.83, inicia un proceso sin usar comillas en la ruta (path). Esto puede causar la carga de un ejecutable previamente colocado con un nombre similar a las partes de la path, en lugar de uno deseado. • https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk124972#Resolved%20Issues • CWE-428: Unquoted Search Path or Element •