First published: Thu May 12 2022(Updated: )
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security Clients | <e86.40 | |
Microsoft Windows Operating System |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability identifier for this issue is CVE-2022-23742.
The affected software is Check Point Endpoint Security Client for Windows versions earlier than E86.40.
An attacker can replace forensic report files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
This vulnerability has a severity score of 7.8, which is considered high.
To fix this vulnerability, update Check Point Endpoint Security Client to version E86.40 or later.