CWE-65
Windows Hard Link
The product, when opening a file or directory, does not sufficiently handle when the name is associated with a hard link to a target that is outside of the intended control sphere. This could allow an attacker to cause the product to operate on unauthorized files.
CVE-2019-19231 (GCVE-0-2019-19231)
Vulnerability from cvelistv5
Published
2019-12-20 21:08
Modified
2024-08-05 02:09
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, 14.2, and 14.3 Agent for Windows that can allow a local attacker to gain escalated privileges.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
CA Technologies, Broadcom Company | CA Client Automation |
Version: 14.0 Version: 14.1 Version: 14.2 Version: 14.3 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T02:09:39.417Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/CA20191218-01-security-notice-for-ca-client-automation-agent-for-windows.html" }, { "name": "20191225 CA20191218-01: Security Notice for CA Client Automation Agent for Windows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "https://seclists.org/bugtraq/2019/Dec/41" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/155758/CA-Client-Automation-14.x-Privilege-Escalation.html" }, { "name": "20200103 CA20191218-01: Security Notice for CA Client Automation Agent for Windows", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://seclists.org/fulldisclosure/2020/Jan/5" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "CA Client Automation", "vendor": "CA Technologies, Broadcom Company", "versions": [ { "status": "affected", "version": "14.0" }, { "status": "affected", "version": "14.1" }, { "status": "affected", "version": "14.2" }, { "status": "affected", "version": "14.3" } ] } ], "descriptions": [ { "lang": "en", "value": "An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, 14.2, and 14.3 Agent for Windows that can allow a local attacker to gain escalated privileges." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-65", "description": "CWE-65", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-03T19:06:06", "orgId": "e291eae9-7c0a-46ac-ba7d-5251811f8b7f", "shortName": "ca" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/CA20191218-01-security-notice-for-ca-client-automation-agent-for-windows.html" }, { "name": "20191225 CA20191218-01: Security Notice for CA Client Automation Agent for Windows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "https://seclists.org/bugtraq/2019/Dec/41" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/155758/CA-Client-Automation-14.x-Privilege-Escalation.html" }, { "name": "20200103 CA20191218-01: Security Notice for CA Client Automation Agent for Windows", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://seclists.org/fulldisclosure/2020/Jan/5" } ], "source": { "discovery": "UNKNOWN" }, "x_generator": { "engine": "Vulnogram 0.0.9" }, "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "vuln@ca.com", "ID": "CVE-2019-19231", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "CA Client Automation", "version": { "version_data": [ { "version_affected": "=", "version_name": "14", "version_value": "14.0" }, { "version_affected": "=", "version_name": "14", "version_value": "14.1" }, { "version_affected": "=", "version_name": "14", "version_value": "14.2" }, { "version_affected": "=", "version_name": "14", "version_value": "14.3" } ] } } ] }, "vendor_name": "CA Technologies, Broadcom Company" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "An insecure file access vulnerability exists in CA Client Automation 14.0, 14.1, 14.2, and 14.3 Agent for Windows that can allow a local attacker to gain escalated privileges." } ] }, "generator": { "engine": "Vulnogram 0.0.9" }, "impact": { "cvss": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-65" } ] } ] }, "references": { "reference_data": [ { "name": "https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/CA20191218-01-security-notice-for-ca-client-automation-agent-for-windows.html", "refsource": "CONFIRM", "url": "https://techdocs.broadcom.com/us/product-content/recommended-reading/security-notices/CA20191218-01-security-notice-for-ca-client-automation-agent-for-windows.html" }, { "name": "20191225 CA20191218-01: Security Notice for CA Client Automation Agent for Windows", "refsource": "BUGTRAQ", "url": "https://seclists.org/bugtraq/2019/Dec/41" }, { "name": "http://packetstormsecurity.com/files/155758/CA-Client-Automation-14.x-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/155758/CA-Client-Automation-14.x-Privilege-Escalation.html" }, { "name": "20200103 CA20191218-01: Security Notice for CA Client Automation Agent for Windows", "refsource": "FULLDISC", "url": "http://seclists.org/fulldisclosure/2020/Jan/5" } ] }, "source": { "discovery": "UNKNOWN" } } } }, "cveMetadata": { "assignerOrgId": "e291eae9-7c0a-46ac-ba7d-5251811f8b7f", "assignerShortName": "ca", "cveId": "CVE-2019-19231", "datePublished": "2019-12-20T21:08:06", "dateReserved": "2019-11-22T00:00:00", "dateUpdated": "2024-08-05T02:09:39.417Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-8452 (GCVE-0-2019-8452)
Vulnerability from cvelistv5
Published
2019-04-22 21:43
Modified
2024-08-04 21:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.
References
Impacted products
Vendor | Product | Version | |||||||
---|---|---|---|---|---|---|---|---|---|
► | Check Point ZoneAlarm | Check Point ZoneAlarm |
Version: Check Point ZoneAlarm up to 15.4.062 |
||||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:17:31.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk150012" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://packetstormsecurity.com/files/154754/CheckPoint-Endpoint-Security-Client-ZoneAlarm-Privilege-Escalation.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point ZoneAlarm", "vendor": "Check Point ZoneAlarm", "versions": [ { "status": "affected", "version": "Check Point ZoneAlarm up to 15.4.062" } ] }, { "product": "Check Point Endpoint Security client for Windows", "vendor": "Check Point ZoneAlarm", "versions": [ { "status": "affected", "version": "Check Point Endpoint Security client for Windows before E80.96" } ] } ], "descriptions": [ { "lang": "en", "value": "A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-65", "description": "CWE-65", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-10-07T16:06:05", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk150012" }, { "tags": [ "x_refsource_MISC" ], "url": "http://packetstormsecurity.com/files/154754/CheckPoint-Endpoint-Security-Client-ZoneAlarm-Privilege-Escalation.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2019-8452", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point ZoneAlarm", "version": { "version_data": [ { "version_value": "Check Point ZoneAlarm up to 15.4.062" } ] } }, { "product_name": "Check Point Endpoint Security client for Windows", "version": { "version_data": [ { "version_value": "Check Point Endpoint Security client for Windows before E80.96" } ] } } ] }, "vendor_name": "Check Point ZoneAlarm" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-65" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960", "refsource": "MISC", "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "name": "https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk150012", "refsource": "CONFIRM", "url": "https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk150012" }, { "name": "http://packetstormsecurity.com/files/154754/CheckPoint-Endpoint-Security-Client-ZoneAlarm-Privilege-Escalation.html", "refsource": "MISC", "url": "http://packetstormsecurity.com/files/154754/CheckPoint-Endpoint-Security-Client-ZoneAlarm-Privilege-Escalation.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2019-8452", "datePublished": "2019-04-22T21:43:19", "dateReserved": "2019-02-18T00:00:00", "dateUpdated": "2024-08-04T21:17:31.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-8454 (GCVE-0-2019-8454)
Vulnerability from cvelistv5
Published
2019-04-29 15:10
Modified
2024-08-04 21:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-65 - ,CWE-377
Summary
A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
Check Point | Check Point Endpoint Security client for Windows |
Version: before E80.96 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:17:31.447Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk150012" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point Endpoint Security client for Windows", "vendor": "Check Point", "versions": [ { "status": "affected", "version": "before E80.96" } ] } ], "descriptions": [ { "lang": "en", "value": "A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-65", "description": "CWE-65,CWE-377", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-29T15:10:15", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk150012" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2019-8454", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point Endpoint Security client for Windows", "version": { "version_data": [ { "version_value": "before E80.96" } ] } } ] }, "vendor_name": "Check Point" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A local attacker can create a hard-link between a file to which the Check Point Endpoint Security client for Windows before E80.96 writes and another BAT file, then by impersonating the WPAD server, the attacker can write BAT commands into that file that will later be run by the user or the system." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-65,CWE-377" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk150012", "refsource": "MISC", "url": "https://supportcenter.us.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk150012" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2019-8454", "datePublished": "2019-04-29T15:10:15", "dateReserved": "2019-02-18T00:00:00", "dateUpdated": "2024-08-04T21:17:31.447Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2019-8455 (GCVE-0-2019-8455)
Vulnerability from cvelistv5
Published
2019-04-17 14:05
Modified
2024-08-04 21:17
Severity ?
VLAI Severity ?
EPSS score ?
CWE
Summary
A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point ZoneAlarm |
Version: up to 15.4.062 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T21:17:31.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "name": "108029", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/108029" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point ZoneAlarm", "vendor": "n/a", "versions": [ { "status": "affected", "version": "up to 15.4.062" } ] } ], "descriptions": [ { "lang": "en", "value": "A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-65", "description": "CWE-65", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2019-04-23T15:06:11", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "name": "108029", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/108029" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2019-8455", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point ZoneAlarm", "version": { "version_data": [ { "version_value": "up to 15.4.062" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-65" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960", "refsource": "MISC", "url": "https://www.zonealarm.com/software/release-history/zafavfw.html#15.4.260.17960" }, { "name": "108029", "refsource": "BID", "url": "http://www.securityfocus.com/bid/108029" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2019-8455", "datePublished": "2019-04-17T14:05:54", "dateReserved": "2019-02-18T00:00:00", "dateUpdated": "2024-08-04T21:17:31.568Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2020-6013 (GCVE-0-2020-6013)
Vulnerability from cvelistv5
Published
2020-07-06 17:54
Modified
2024-08-04 08:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-65 - Windows Hard Link
Summary
ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point ZoneAlarm |
Version: before 15.8.109.18436 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T08:47:41.024Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.zonealarm.com/software/extreme-security/release-history" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point ZoneAlarm", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before 15.8.109.18436" } ] } ], "descriptions": [ { "lang": "en", "value": "ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-65", "description": "CWE-65: Windows Hard Link", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2020-07-06T17:54:48", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.zonealarm.com/software/extreme-security/release-history" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2020-6013", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point ZoneAlarm", "version": { "version_data": [ { "version_value": "before 15.8.109.18436" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-65: Windows Hard Link" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.zonealarm.com/software/extreme-security/release-history", "refsource": "MISC", "url": "https://www.zonealarm.com/software/extreme-security/release-history" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2020-6013", "datePublished": "2020-07-06T17:54:48", "dateReserved": "2020-01-07T00:00:00", "dateUpdated": "2024-08-04T08:47:41.024Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2022-23742 (GCVE-0-2022-23742)
Vulnerability from cvelistv5
Published
2022-05-12 19:23
Modified
2024-08-03 03:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-65 - Windows Hard Link
Summary
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point Endpoint Security Client for Windows |
Version: before E86.40 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T03:51:46.018Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk178665%2C" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk179132" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point Endpoint Security Client for Windows", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before E86.40" } ] } ], "descriptions": [ { "lang": "en", "value": "Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-65", "description": "CWE-65: Windows Hard Link", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-12T19:23:18", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk178665%2C" }, { "tags": [ "x_refsource_MISC" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk179132" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2022-23742", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point Endpoint Security Client for Windows", "version": { "version_data": [ { "version_value": "before E86.40" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-65: Windows Hard Link" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportcontent.checkpoint.com/solutions?id=sk178665,", "refsource": "MISC", "url": "https://supportcontent.checkpoint.com/solutions?id=sk178665," }, { "name": "https://supportcontent.checkpoint.com/solutions?id=sk179132", "refsource": "MISC", "url": "https://supportcontent.checkpoint.com/solutions?id=sk179132" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2022-23742", "datePublished": "2022-05-12T19:23:18", "dateReserved": "2022-01-19T00:00:00", "dateUpdated": "2024-08-03T03:51:46.018Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Mitigation ID: MIT-48.1
Phase: Architecture and Design
Strategy: Separation of Privilege
Description:
- Follow the principle of least privilege when assigning access rights to entities in a software system.
- Denying access to a file can prevent an attacker from replacing that file with a link to a sensitive file. Ensure good compartmentalization in the system to provide protected areas that can be trusted.
No CAPEC attack patterns related to this CWE.