First published: Thu Jun 20 2019(Updated: )
Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security Clients | <e81.00 | |
Checkpoint Remote Access Clients | <e81.00 | |
Checkpoint Capsule Docs | <e81.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2019-8458.
The severity of CVE-2019-8458 is medium with a severity value of 4.4.
Check Point Endpoint Security Clients, Check Point Remote Access Clients, and Check Point Capsule Docs are affected by CVE-2019-8458.
An attacker with administrator privileges can leverage CVE-2019-8458 to gain code execution within a Check Point Software Technology product.
Update the Check Point Endpoint Security Client for Windows to version E81.00 or higher to fix CVE-2019-8458.