Directory Access Vulnerability in Check Point Remote Access Client
CVE-2021-30360
7.8HIGH
Key Information:
- Vendor
- Checkpoint
- Vendor
- CVE Published:
- 10 January 2022
Summary
This vulnerability enables unauthorized users to access the installation repair directory of the Check Point Remote Access Client. As the Microsoft Installer permits regular users to execute repair operations, an attacker can exploit this by initiating a repair and placing a maliciously crafted executable file in the repair directory. This executable runs with the privileges assigned to the Check Point Remote Access Client, potentially allowing the attacker to execute arbitrary code and compromise the system's security.
Affected Version(s)
Check Point Remote Access Client before E86.20
References
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved