Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
References
Link | Resource |
---|---|
https://supportcontent.checkpoint.com/solutions?id=sk178665%2C | |
https://supportcontent.checkpoint.com/solutions?id=sk179132 | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
23 May 2022, 19:03
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://supportcontent.checkpoint.com/solutions?id=sk178665, - Broken Link | |
References | (MISC) https://supportcontent.checkpoint.com/solutions?id=sk179132 - Vendor Advisory | |
CPE | cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:* cpe:2.3:a:checkpoint:endpoint_security:*:*:*:*:*:*:*:* |
|
CWE | CWE-59 | |
CVSS |
v2 : v3 : |
v2 : 4.6
v3 : 7.8 |
12 May 2022, 20:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-05-12 20:15
Updated : 2024-02-04 22:29
NVD link : CVE-2022-23742
Mitre link : CVE-2022-23742
CVE.ORG link : CVE-2022-23742
JSON object : View
Products Affected
microsoft
- windows
checkpoint
- endpoint_security