Filtered by CWE-65
Total 6 CVE
CVE Vendors Products Updated CVSS v3.1
CVE-2022-23742 2 Checkpoint, Microsoft 2 Endpoint Security, Windows 2023-11-07 7.8 High
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
CVE-2019-8454 2 Checkpoint, Microsoft 2 Endpoint Security, Windows 2023-11-07 7.0 High
A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.
CVE-2019-19231 2 Broadcom, Microsoft 2 Ca Client Automation, Windows 2020-10-22 7.8 High
An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, 14.2, and 14.3 Agent for Windows that can allow a local attacker to gain escalated privileges.
CVE-2019-8452 1 Checkpoint 2 Endpoint Security, Zonealarm 2020-10-22 7.8 High
A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.
CVE-2019-8455 1 Checkpoint 1 Zonealarm 2020-10-22 7.1 High
A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.
CVE-2020-6013 1 Checkpoint 1 Zonealarm Extreme Security 2020-07-13 8.8 High
ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems.