
CVE-2022-41604
https://notcve.org/view.php?id=CVE-2022-41604
27 Sep 2022 — Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM. Check Point ZoneAlarm Extreme Security versiones anteriores a 15.8.211.19229, permite a usuarios locales escalar privilegios. Esto ocurre d... • https://github.com/Wh04m1001/ZoneAlarmEoP • CWE-269: Improper Privilege Management •

CVE-2022-23743
https://notcve.org/view.php?id=CVE-2022-23743
11 May 2022 — Check Point ZoneAlarm before version 15.8.200.19118 allows a local actor to escalate privileges during the upgrade process. In addition, weak permissions in the ProgramData\CheckPoint\ZoneAlarm\Data\Updates directory allow a local attacker the ability to execute an arbitrary file write, leading to execution of code as local system, in ZoneAlarm versions before v15.8.211.192119 Check Point ZoneAlarm versiones anteriores a 15.8.200.19118, permite a un actor local escalar privilegios durante el proceso de actu... • https://www.zonealarm.com/software/extreme-security/release-history • CWE-269: Improper Privilege Management CWE-732: Incorrect Permission Assignment for Critical Resource •

CVE-2020-6023
https://notcve.org/view.php?id=CVE-2020-6023
27 Oct 2020 — Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware. Check Point ZoneAlarm versiones anteriores a 15.8.139.18543, permite a un actor local escalar privilegios mientras restaura archivos en Anti-Ransomware • https://www.zonealarm.com/software/extreme-security/release-history • CWE-426: Untrusted Search Path •

CVE-2020-6022
https://notcve.org/view.php?id=CVE-2020-6022
27 Oct 2020 — Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware. Check Point ZoneAlarm versiones anteriores a 15.8.139.18543, permite a un actor local eliminar archivos arbitrarios mientras restaura archivos en Anti-Ransomware • https://www.zonealarm.com/software/extreme-security/release-history • CWE-275: Permission Issues •

CVE-2019-8452 – CheckPoint Endpoint Security Client/ZoneAlarm 15.4.062.17802 - Privilege Escalation
https://notcve.org/view.php?id=CVE-2019-8452
22 Apr 2019 — A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file. Un enlace físico creado desde el archivo log file de Check Point ZoneAlarm hasta la versión 15.4.062 o el cliente de Check Point Endpoint Security para Windows ant... • https://packetstorm.news/files/id/154754 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-65: Windows Hard Link •

CVE-2019-8453
https://notcve.org/view.php?id=CVE-2019-8453
17 Apr 2019 — Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions. This can allow a local attacker to replace a DLL file with a malicious one and cause Denial of Service to the client. Algunos de los archivos DLL cargados por ZoneAlarm de Check Point hasta la versión 15.4.062 se toman de directorios donde todos los usuarios tienen permisos de escritura. Esto puede permitir a un atacante local reemplazar un archivo DLL por uno malicioso y causar... • http://www.securityfocus.com/bid/108029 • CWE-114: Process Control CWE-426: Untrusted Search Path •

CVE-2019-8455
https://notcve.org/view.php?id=CVE-2019-8455
17 Apr 2019 — A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file. Un enlace físico creado a partir del archivo de registro de Check Point ZoneAlarm versión hasta 15.4.062, cualquier archivo en el sistema cambiará su permiso para que todos los usuarios puedan acceder a ese archivo vinculado. Hacer e... • http://www.securityfocus.com/bid/108029 • CWE-59: Improper Link Resolution Before File Access ('Link Following') CWE-65: Windows Hard Link •

CVE-2018-8790
https://notcve.org/view.php?id=CVE-2018-8790
01 Mar 2019 — Check Point ZoneAlarm version 15.3.064.17729 and below expose a WCF service that can allow a local low privileged user to execute arbitrary code as SYSTEM. Check Point ZoneAlarm, en versiones 15.3.064.17729 y anteriores, expone un servicio WCF que puede permitir que un usuario local con pocos privilegios ejecute código arbitrario como SYSTEM. • http://www.securityfocus.com/bid/107254 • CWE-863: Incorrect Authorization •

CVE-2008-7025 – ZoneAlarm 8.0.20 - HTTP Proxy Remote Denial of Service
https://notcve.org/view.php?id=CVE-2008-7025
21 Aug 2009 — TrueVector in Check Point ZoneAlarm 8.0.020.000, with vsmon.exe running, allows remote HTTP proxies to cause a denial of service (crash) and disable the HIDS module via a crafted response. TrueVector en Check Point ZoneAlarm v8.0.020.000, con vsmon.exe en ejecución, permite a proxies HTTP remotos provocar una denegación de servicio (caída) y deshabilitar el módulo HIDS mediante una respuesta manipulada. • https://www.exploit-db.com/exploits/32428 •

CVE-2008-7009 – ZoneAlarm Security Suite 7.0 - AntiVirus Directory Path Buffer Overflow (PoC)
https://notcve.org/view.php?id=CVE-2008-7009
19 Aug 2009 — Buffer overflow in multiscan.exe in Check Point ZoneAlarm Security Suite 7.0.483.000 and 8.0.020.000 allows local users to execute arbitrary code via a file or directory with a long path. NOTE: some of these details are obtained from third party information. Desbordamiento de búfer en multiscan.exe en Check Point ZoneAlarm Security Suite v7.0.483.000 y v8.0.020.000 permite a usuarios locales ejecutar código de forma arbitraria a través de un fichero o directorio con una ruta larga. NOTA: Algunos de estos de... • https://www.exploit-db.com/exploits/32356 • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer •