First published: Fri Oct 30 2020(Updated: )
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security | <e83.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6014 is a vulnerability in Check Point Endpoint Security Client for Windows that allows an attacker with administrator privileges to gain code execution within a Check Point solution.
The severity of CVE-2020-6014 is medium with a CVSS score of 6.5.
CVE-2020-6014 affects Check Point Endpoint Security Client for Windows, specifically versions before E83.20, with Anti-Bot or Threat Emulation blades installed.
An attacker with administrator privileges can exploit CVE-2020-6014 by leveraging the loading of a non-existent DLL during a query for the Domain Name in Check Point Endpoint Security Client for Windows.
To fix CVE-2020-6014, update to version E83.20 or higher of Check Point Endpoint Security Client for Windows.