CVE-2020-6014 — Process Control in Checkpoint Endpoint Security
Severity
6.5MEDIUMNVD
EPSS
0.1%
top 70.18%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedNov 2
Latest updateMay 24
Description
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
CVSS vector
CVSS:3.1/AV:L/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:HExploitability: 0.6 | Impact: 5.9
Affected Packages2 packages
🔴Vulnerability Details
2GHSA▶
GHSA-5rvw-257c-fpq2: Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83↗2022-05-24
CVEList▶
CVE-2020-6014: Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83↗2020-10-30