Vulnerabilities
Vulnerable Software
Checkpoint:  Security Vulnerabilities
CVE-2024-24919
Known exploited
Potentially allowing an attacker to read certain information on Check Point Security Gateways once connected to the internet and enabled with remote Access VPN or Mobile Access Software Blades. A Security fix that mitigates this vulnerability is available.
CVSS Score
8.6
EPSS Score
0.943
Published
2024-05-28
Local attacker can escalate privileges on affected installations of Check Point Harmony Endpoint/ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability.
CVSS Score
7.8
EPSS Score
0.0
Published
2023-11-12
Local user may lead to privilege escalation using Gaia Portal hostnames page.
CVSS Score
7.2
EPSS Score
0.035
Published
2023-07-26
Local privilege escalation in Check Point Endpoint Security Client (version E87.30) via crafted OpenSSL configuration file
CVSS Score
7.8
EPSS Score
0.016
Published
2023-07-23
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.
CVSS Score
7.5
EPSS Score
0.002
Published
2022-11-30
Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.
CVSS Score
8.8
EPSS Score
0.0
Published
2022-09-27
A potential memory corruption issue was found in Capsule Workspace Android app (running on GrapheneOS). This could result in application crashing but could not be used to gather any sensitive information.
CVSS Score
7.5
EPSS Score
0.005
Published
2022-07-18
Check Point Endpoint before version E86.50 failed to protect against specific registry change which allowed to disable endpoint protection by a local administrator.
CVSS Score
2.3
EPSS Score
0.001
Published
2022-07-07
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
CVSS Score
7.8
EPSS Score
0.001
Published
2022-05-12
The Check Point Gaia Portal's GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS.
CVSS Score
6.7
EPSS Score
0.002
Published
2022-05-11


Contact Us

Shodan ® - All rights reserved