First published: Thu Aug 29 2019(Updated: )
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Capsule Docs Standalone Client | <e80.20 | |
Checkpoint Endpoint Security | <e81.30 | |
Checkpoint Remote Access Clients | <e81.30 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8461 is a vulnerability in Check Point Endpoint Security Initial Client for Windows before version E81.30 that allows an attacker to gain local privilege escalation.
CVE-2019-8461 has a severity rating of 7.8 out of 10 (high severity).
CVE-2019-8461 allows an attacker to load a specially crafted DLL placed in any accessible PATH location, which can lead to local privilege escalation.
Check Point Endpoint Security Initial Client for Windows versions before E81.30 are affected by CVE-2019-8461.
To mitigate the CVE-2019-8461 vulnerability, it is recommended to update Check Point Endpoint Security Initial Client for Windows to version E81.30 or later.