CVE-2020-6014Process Control in Checkpoint Endpoint Security

Severity
6.5MEDIUMNVD
EPSS
0.1%
top 70.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 2
Latest updateMay 24

Description

Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.

CVSS vector

CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:HExploitability: 0.6 | Impact: 5.9

Affected Packages2 packages

🔴Vulnerability Details

2
GHSA
GHSA-5rvw-257c-fpq2: Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E832022-05-24
CVEList
CVE-2020-6014: Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E832020-10-30
CVE-2020-6014 — Process Control in Checkpoint | cvebase