Check Point Remote Access Client Insecure Library Loading

Medium Nessus Plugin ID 62076


The remote Windows host has a VPN client installed that is affected by an insecure library loading vulnerability.


The version of Check Point Remote Access Client installed on the remote Windows host is earlier than E75.10 and is, therefore, reportedly affected by an insecure library loading vulnerability. If an attacker can trick a user on the affected system into opening a specially crafted file, they may be able to leverage this issue to execute arbitrary code subject to the user's privileges.


Upgrade to Check Point Remote Access Client E75.20 or later.

See Also

Plugin Details

Severity: Medium

ID: 62076

File Name: checkpoint_endpoint_rac_dll_loading.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2012/09/13

Modified: 2016/10/07

Dependencies: 62075

Risk Information

Risk Factor: Medium


Base Score: 6.9

Temporal Score: 5.7

Vector: CVSS2#AV:L/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:checkpoint:remote_access_clients

Required KB Items: SMB/Check Point Remote Access Client/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/06/10

Vulnerability Publication Date: 2012/06/10

Reference Information

CVE: CVE-2012-2753

BID: 53925

OSVDB: 82840