Check Point Local Privilege Escalation

high Nessus Plugin ID 134890

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The remote host is running a version of Checkpoint Endpoint Security Initial Client. that is vulnerable to a local privilege escalation vulnerability. The vulnerability exists because vulnerable versions attempt to load a DLL that is placed in any PATH location on a clean install. An attacker could leverage this by creating a specially crafted DLL and placing it in any PATH location, when the victim installs Check Point Endpoint Security Initial Client, the DLL will be executed as that user. (CVE-2019-8461)

Solution

See the vendor advisory for workarounds.

See Also

http://www.nessus.org/u?bc8c6396

Plugin Details

Severity: High

ID: 134890

File Name: check_point_sk161792.nasl

Version: 1.4

Type: local

Family: Firewalls

Published: 3/25/2020

Updated: 1/26/2023

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Medium

Base Score: 6.8

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

CVSS Score Source: CVE-2019-8461

CVSS v3

Risk Factor: High

Base Score: 7.8

Temporal Score: 7.2

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:checkpoint:remote_access_clients

Required KB Items: Settings/ParanoidReport, SMB/Check Point Remote Access Client/98.6.1008.0/VerUI

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 8/26/2019

Vulnerability Publication Date: 8/31/2019

Exploitable With

Core Impact

Reference Information

CVE: CVE-2019-8461