CVE-2022-23742
7.8HIGH
Key Information
- Vendor
- Checkpoint
- Status
- Check Point Endpoint Security Client For Windows
- Vendor
- CVE Published:
- 12 May 2022
Summary
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
Affected Version(s)
Check Point Endpoint Security Client for Windows = before E86.40
CVSS V3.1
Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published.
Vulnerability Reserved.
Collectors
NVD DatabaseMitre Database