First published: Thu Jun 20 2019(Updated: )
Check Point Endpoint Security Client for Windows, with the VPN blade, before version E80.83, starts a process without using quotes in the path. This can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Jumbo Hotfix For Endpoint Security Server | <r77.30 | |
Checkpoint Endpoint Security Server Package | <r77.30.03 | |
Checkpoint Smartconsole For Endpoint Security Server | <r77.30.03 | |
Checkpoint Smartconsole For Endpoint Security Server | =e80.83 | |
Checkpoint Endpoint Security Clients | <e80.83 | |
Checkpoint Remote Access Clients | <e80.83 | |
Checkpoint Capsule Docs Standalone Client | <e80.82 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this issue is CVE-2019-8459.
The severity level of CVE-2019-8459 is critical with a score of 9.8.
The affected software versions are Check Point Endpoint Security Client for Windows with the VPN blade before version E80.83.
CVE-2019-8459 can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one.
Yes, a fix is available for CVE-2019-8459. Refer to the Check Point support website for more information.