First published: Thu Dec 03 2020(Updated: )
Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client’s privileges.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security | <e84.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6021 is a vulnerability that allows write access to the directory from which the installation repair takes place in Check Point Endpoint Security Client for Windows before version E84.20.
CVE-2020-6021 occurs because the MS Installer allows regular users to run the repair, enabling an attacker to initiate the installation repair and place a specially crafted DLL file into the directory.
The severity of CVE-2020-6021 is high, with a severity score of 7.8 (out of 10).
To fix CVE-2020-6021, update Check Point Endpoint Security Client for Windows to version E84.20 or later.
More information about CVE-2020-6021 can be found at the following link: [https://supportcontent.checkpoint.com/solutions?id=sk170512](https://supportcontent.checkpoint.com/solutions?id=sk170512)