SynopsisThe remote host is missing a vendor-supplied security patch.
DescriptionThe remote host is running a version of Checkpoint Endpoint Security Initial Client. that is vulnerable to a local privilege escalation vulnerability. The vulnerability exists because vulnerable versions attempt to load a DLL that is placed in any PATH location on a clean install. An attacker could leverage this by creating a specially crafted DLL and placing it in any PATH location, when the victim installs Check Point Endpoint Security Initial Client, the DLL will be executed as that user. (CVE-2019-8461)
SolutionSee the vendor advisory for workarounds.