First published: Mon Apr 29 2019(Updated: )
A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.
Credit: cve@checkpoint.com cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security | <e80.96 | |
Microsoft Windows | ||
All of | ||
Checkpoint Endpoint Security | <e80.96 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8454 is a vulnerability that allows a local attacker to create a hard-link between files in Check Point Endpoint Security client for Windows before E80.96, which can be exploited to run malicious commands.
CVE-2019-8454 works by creating a hard-link between a file to which the Check Point Endpoint Security client writes and another BAT file, allowing the attacker to write malicious BAT commands that will later be executed.
CVE-2019-8454 has a severity rating of high, with a severity value of 7.
CVE-2019-8454 affects Check Point Endpoint Security client for Windows versions before E80.96.
No, Microsoft Windows is not vulnerable to CVE-2019-8454.
To fix CVE-2019-8454, it is recommended to update the Check Point Endpoint Security client for Windows to version E80.96 or later.
More information about CVE-2019-8454 can be found at the following link: [https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk150012](https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk150012)