CVE-2021-30360

HIGH

Check Point Remote Access Client - Code Injection

Title source: llm

Description

Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.

Scores

CVSS v3 7.8
EPSS 0.0013
EPSS Percentile 31.9%
Attack Vector LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

Classification

CWE
CWE-427
Status published

Affected Products (1)

checkpoint/endpoint_security < e86.20

Timeline

Published Jan 10, 2022
Tracked Since Feb 18, 2026