Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2020-27168 | Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
| Link | Providers |
|---|---|
| https://supportcontent.checkpoint.com/solutions?id=sk168081 |
|
History
No history.
Status: PUBLISHED
Assigner: checkpoint
Published:
Updated: 2024-08-04T08:47:41.014Z
Reserved: 2020-01-07T00:00:00
Link: CVE-2020-6014
No data.
Status : Modified
Published: 2020-11-02T21:15:34.163
Modified: 2024-11-21T05:34:59.040
Link: CVE-2020-6014
No data.
OpenCVE Enrichment
No data.
EUVD