Description
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
References (2)
Core 2
Core References
Product, Vendor Advisory x_refsource_misc
https://supportcontent.checkpoint.com/solutions?id=sk176853
Exploit, Third Party Advisory x_refsource_misc
https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0001/MNDT-2022-0001.md
Scores
CVSS v3
7.8
EPSS
0.0013
EPSS Percentile
31.6%
Attack Vector
LOCAL
CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Details
CWE
CWE-427
Status
published
Products (1)
checkpoint/endpoint_security
< e86.20
Published
Jan 10, 2022
Tracked Since
Feb 18, 2026