Check Point Local Privilege Escalation

Medium Nessus Plugin ID 134890


The remote host is missing a vendor-supplied security patch.


The remote host is running a version of Checkpoint Endpoint Security Initial Client. that is vulnerable to a local privilege escalation vulnerability. The vulnerability exists because vulnerable versions attempt to load a DLL that is placed in any PATH location on a clean install. An attacker could leverage this by creating a specially crafted DLL and placing it in any PATH location, when the victim installs Check Point Endpoint Security Initial Client, the DLL will be executed as that user. (CVE-2019-8461)


See the vendor advisory for workarounds.

See Also

Plugin Details

Severity: Medium

ID: 134890

File Name: check_point_sk161792.nasl

Version: 1.3

Type: local

Family: Firewalls

Published: 2020/03/25

Updated: 2020/03/26

Dependencies: 62075

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Medium

CVSS Score Source: CVE-2019-8461

CVSS v2.0

Base Score: 6.8

Temporal Score: 5

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

CVSS v3.0

Base Score: 7.8

Temporal Score: 6.8

Vector: CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:U/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:checkpoint:remote_access_clients

Required KB Items: SMB/Check Point Remote Access Client/98.6.1008.0/VerUI, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 2019/08/26

Vulnerability Publication Date: 2019/08/31

Reference Information

CVE: CVE-2019-8461