Check Point ZoneAlarm Extreme Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Check Point ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Forensic Recorder service. By creating a symbolic link, an attacker can abuse the service to overwrite arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21677.
History

Fri, 22 Nov 2024 21:15:00 +0000

Type Values Removed Values Added
First Time appeared Check Point
Check Point zonealarm Extreme Security
CPEs cpe:2.3:a:check_point:zonealarm_extreme_security:4.0.148.0:*:*:*:*:*:*:*
Vendors & Products Check Point
Check Point zonealarm Extreme Security
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Fri, 22 Nov 2024 20:15:00 +0000

Type Values Removed Values Added
Description Check Point ZoneAlarm Extreme Security Link Following Local Privilege Escalation Vulnerability. This vulnerability allows local attackers to escalate privileges on affected installations of Check Point ZoneAlarm Extreme Security. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the Forensic Recorder service. By creating a symbolic link, an attacker can abuse the service to overwrite arbitrary files. An attacker can leverage this vulnerability to escalate privileges and execute arbitrary code in the context of SYSTEM. Was ZDI-CAN-21677.
Title Check Point ZoneAlarm Extreme Security Link Following Local Privilege Escalation Vulnerability
Weaknesses CWE-59
References
Metrics cvssV3_0

{'score': 7.8, 'vector': 'CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: zdi

Published: 2024-11-22T20:05:39.766Z

Updated: 2024-11-22T20:55:29.976Z

Reserved: 2024-06-20T21:51:41.913Z

Link: CVE-2024-6233

cve-icon Vulnrichment

Updated: 2024-11-22T20:54:56.888Z

cve-icon NVD

Status : Received

Published: 2024-11-22T20:15:11.437

Modified: 2024-11-22T20:15:11.437

Link: CVE-2024-6233

cve-icon Redhat

No data.