RSS   Vulnerabilities for 'Endpoint security'   RSS

2022-07-07
 
CVE-2022-23744

NVD-CWE-noinfo
 

 
Check Point Endpoint before version E86.50 failed to protect against specific registry change which allowed to disable endpoint protection by a local administrator.

 
2022-01-10
 
CVE-2021-30360

CWE-427
 

 
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.

 
2020-12-03
 
CVE-2020-6021

CWE-427
 

 
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client�??s privileges.

 
2019-08-29
 
CVE-2019-8461

CWE-426
 

 
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user.

 
2019-04-29
 
CVE-2019-8454

CWE-264
 

 
A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.

 
2013-11-30
 
CVE-2013-5636

CWE-255
 

 
Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses.

 
 
CVE-2013-5635

CWE-255
 

 
Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously.

 
2012-06-19
 
CVE-2012-2753

CWE-Other
 

 
Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory.

 

 >>> Vendor: Checkpoint 43 Products
Firewall-1
Provider-1
Vpn-1
Check point vpn
Next generation
Vpn-1 firewall-1
Ng-ai
Check point integrity client
Connectra ngx
Zonealarm
Zonealarm security suite
Check point
Express
Vpn-1 firewall-1 next generation
Secureclient ng
Vpn-1 secureclient
Web intelligence
Vpn-1 utm edge
Vpn-1 utm edge w embedded ngx
Check point vpn-1 pro
Vpn-1 power utm
Vpn-1 power utm with ngx
Firewall-1 pki web service
Vpn-1 firewall-1 vsx
Multi-domain management/provider-1
Endpoint connect
Endpoint security
Endpoint security vpn
Remote access clients
Zonealarm extreme security
Endpoint security mi server r73
Gaia os
Ipso os
Management server
Security gateway
Session authentication agent
Ipsec vpn
Smartconsole for endpoint security server
Endpoint security clients
Zonealarm anti-ransomware
Identity agent
Mobile access portal agent
Harmony endpoint


Copyright 2024, cxsecurity.com

 

Back to Top