Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
References
Link | Resource |
---|---|
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0001/MNDT-2022-0001.md | Exploit Third Party Advisory |
https://supportcontent.checkpoint.com/solutions?id=sk176853 | Product Vendor Advisory |
Configurations
History
14 Jan 2022, 16:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:checkpoint:endpoint_security:*:*:*:*:*:windows:*:* | |
CVSS |
v2 : v3 : |
v2 : 7.2
v3 : 7.8 |
CWE | CWE-427 | |
References | (MISC) https://supportcontent.checkpoint.com/solutions?id=sk176853 - Product, Vendor Advisory | |
References | (MISC) https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0001/MNDT-2022-0001.md - Exploit, Third Party Advisory |
10 Jan 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
10 Jan 2022, 14:14
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-10 14:10
Updated : 2024-02-04 22:08
NVD link : CVE-2021-30360
Mitre link : CVE-2021-30360
CVE.ORG link : CVE-2021-30360
JSON object : View
Products Affected
checkpoint
- endpoint_security
CWE
CWE-427
Uncontrolled Search Path Element