First published: Thu Jul 07 2022(Updated: )
Check Point Endpoint before version E86.50 failed to protect against specific registry change which allowed to disable endpoint protection by a local administrator.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security Clients | =e83 | |
Checkpoint Endpoint Security Clients | =e84 | |
Checkpoint Endpoint Security Clients | =e85 | |
Checkpoint Endpoint Security Clients | =e86.10 | |
Checkpoint Endpoint Security Clients | =e86.20 | |
Checkpoint Endpoint Security Clients | =e86.30 | |
Checkpoint Endpoint Security Clients | =e86.40 | |
Checkpoint Harmony Endpoint | =e83 | |
Checkpoint Harmony Endpoint | =e84 | |
Checkpoint Harmony Endpoint | =e85 | |
Checkpoint Harmony Endpoint | =e86.10 | |
Checkpoint Harmony Endpoint | =e86.20 | |
Checkpoint Harmony Endpoint | =e86.30 | |
Checkpoint Harmony Endpoint | =e86.40 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-23744 is a vulnerability in Check Point Endpoint before version E86.50 that allows a local administrator to disable endpoint protection by making a specific registry change.
CVE-2022-23744 affects Check Point Endpoint Security versions E83 to E86.40.
The severity of CVE-2022-23744 is low with a CVSS severity score of 2.3.
To fix CVE-2022-23744, users should update to version E86.50 of Check Point Endpoint Security.
More information about CVE-2022-23744 can be found in the Check Point support center: [link](https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk179609)