The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

Computer vulnerabilities of Check Point Endpoint Security

cybersecurity threat CVE-2019-8461

Check Point Endpoint Security Initial Client for Windows: executing DLL code

Synthesis of the vulnerability

An attacker can create a malicious DLL, and then put it in the current directory of Check Point Endpoint Security Initial Client for Windows, in order to execute code.
Severity: 2/4.
Creation date: 30/08/2019.
Identifiers: CVE-2019-8461, sk160812, sk161792, VIGILANCE-VUL-30209.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Check Point Endpoint Security Initial Client for Windows product uses external shared libraries (DLL).

However, if the working directory contains a malicious DLL, it is automatically loaded.

An attacker can therefore create a malicious DLL, and then put it in the current directory of Check Point Endpoint Security Initial Client for Windows, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

computer threat bulletin CVE-2019-8458

Check Point Endpoint Security Client for Windows: executing DLL code

Synthesis of the vulnerability

An attacker can create a malicious DLL, and then put it in the current directory of Check Point Endpoint Security Client for Windows, in order to execute code.
Severity: 2/4.
Creation date: 21/06/2019.
Identifiers: CVE-2019-8458, sk153053, VIGILANCE-VUL-29598.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can create a malicious DLL, and then put it in the current directory of Check Point Endpoint Security Client for Windows, in order to execute code.
Full Vigil@nce bulletin... (Free trial)

security announce CVE-2019-8459

Check Point Endpoint Security Client for Windows: code execution via Unquoted Command

Synthesis of the vulnerability

An attacker can use a vulnerability via Unquoted Command of Check Point Endpoint Security Client for Windows, in order to run code.
Severity: 2/4.
Creation date: 21/06/2019.
Identifiers: CVE-2019-8459, VIGILANCE-VUL-29597.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can use a vulnerability via Unquoted Command of Check Point Endpoint Security Client for Windows, in order to run code.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2019-8452 CVE-2019-8454

Check Point Endpoint Security: file corruption

Synthesis of the vulnerability

A local attacker can create a hard link, in order to alter the pointed file, with privileges of Check Point Endpoint Security.
Severity: 1/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 30/04/2019.
Identifiers: CVE-2019-8452, CVE-2019-8454, VIGILANCE-VUL-29162.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A local attacker can create a hard link, in order to alter the pointed file, with privileges of Check Point Endpoint Security.
Full Vigil@nce bulletin... (Free trial)

threat note CVE-2019-8456

Check Point IPSec VPN: privilege escalation via IKEv2 Tunnel

Synthesis of the vulnerability

An attacker can bypass restrictions via IKEv2 Tunnel of Check Point IPSec VPN, in order to escalate his privileges.
Severity: 2/4.
Creation date: 08/04/2019.
Identifiers: CVE-2019-8456, sk149892, VIGILANCE-VUL-28964.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

An attacker can bypass restrictions via IKEv2 Tunnel of Check Point IPSec VPN, in order to escalate his privileges.
Full Vigil@nce bulletin... (Free trial)

vulnerability note CVE-2013-7304

Check Point Endpoint Security MI: certificate not checked

Synthesis of the vulnerability

An attacker can access to the Check Point Endpoint Security MI service, without using a certificate.
Severity: 2/4.
Creation date: 20/12/2013.
Identifiers: BID-65135, CVE-2013-7304, sk97784, VIGILANCE-VUL-13968.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Endpoint Security MI Server R73 product can be configured to validate certificates.

However, this configuration directive is ignored, so certificates are not checked.

An attacker can therefore access to the Check Point Endpoint Security MI service, without using a certificate.
Full Vigil@nce bulletin... (Free trial)

cybersecurity weakness CVE-2013-5635 CVE-2013-5636

Check Point Endpoint Security: brute force of Media Encryption EPM

Synthesis of the vulnerability

A local attacker can bypass the limit of number of authentication failures of Media Encryption EPM of Check Point Endpoint Security, in order to use a brute force attack, to access to the encrypted device.
Severity: 2/4.
Number of vulnerabilities in this bulletin: 2.
Creation date: 03/12/2013.
Identifiers: BID-64024, BID-64026, CVE-2013-5635, CVE-2013-5636, sk96589, VIGILANCE-VUL-13859.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Media Encryption EPM Explorer product is used to access to encrypted devices. It is impacted by two vulnerabilities.

An attacker can use several simultaneous instances of Unlock.exe, in order to overcome the maximum limit of password trials. [severity:2/4; BID-64026, CVE-2013-5635]

An attacker can move the DVREM.EPM file, in order to overcome the maximum limit of password trials. [severity:2/4; BID-64024, CVE-2013-5636]

A local attacker can therefore bypass the limit of number of authentication failures of Media Encryption EPM of Check Point Endpoint Security, in order to use a brute force attack, to access to the encrypted device.
Full Vigil@nce bulletin... (Free trial)

computer threat note CVE-2012-2753

Check Point Endpoint Connect: command execution via DLL Preload

Synthesis of the vulnerability

An attacker can create a malicious DLL and invite the victim to open Check Point Endpoint Connect in the same directory, in order to execute code.
Severity: 2/4.
Creation date: 11/06/2012.
Identifiers: BID-53925, CERTA-2012-AVI-318, CVE-2012-2753, sk76480, VIGILANCE-VUL-11688.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The Check Point Endpoint Connect (TrGUI.exe) product loads a library insecurely.

An attacker can thus use the VIGILANCE-VUL-9879 vulnerability to execute code.
Full Vigil@nce bulletin... (Free trial)

threat bulletin CVE-2011-4885

PHP: denial of service via hash collision

Synthesis of the vulnerability

An attacker can send data generating storage collisions, in order to overload a service.
Severity: 3/4.
Creation date: 22/02/2012.
Identifiers: BID-51193, c03183543, CERTA-2011-AVI-728, CVE-2011-4885, DSA-2399-1, DSA-2399-2, FEDORA-2012-0420, FEDORA-2012-0504, HPSBUX02741, MDVSA-2011:197, MDVSA-2012:071, n.runs-SA-2011.004, oCERT-2011-003, openSUSE-SU-2012:0426-1, RHSA-2012:0019-01, RHSA-2012:0033-01, RHSA-2012:0071-01, sk66350, SOL13588, SSRT100728, SUSE-SU-2012:0411-1, SUSE-SU-2012:0496-1, VIGILANCE-VUL-11379.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

The bulletin VIGILANCE-VUL-11254 describes a vulnerability which can be used to create a denial of service on several applications.

This vulnerability impacts PHP.

In order to simplify VIGILANCE-VUL-11254, which was too big, solutions for PHP were moved here.
Full Vigil@nce bulletin... (Free trial)

computer vulnerability note CVE-2011-3414 CVE-2011-4461 CVE-2011-4462

Multiple: denial of service via hash collision

Synthesis of the vulnerability

An attacker can send data generating storage collisions, in order to overload a service.
Severity: 3/4.
Number of vulnerabilities in this bulletin: 11.
Creation date: 28/12/2011.
Revision date: 22/02/2012.
Identifiers: 1506603, 2638420, 2659883, BID-51186, BID-51194, BID-51195, BID-51196, BID-51197, BID-51199, BID-51235, BID-51441, CERTA-2011-AVI-727, CERTA-2011-AVI-728, cpujul2018, CVE-2011-3414, CVE-2011-4461, CVE-2011-4462, CVE-2011-4885, CVE-2011-5034, CVE-2011-5035, CVE-2011-5036, CVE-2011-5037, CVE-2012-0039, CVE-2012-0193, CVE-2012-0839, DSA-2783-1, DSA-2783-2, FEDORA-2012-0730, FEDORA-2012-0752, MS11-100, n.runs-SA-2011.004, NTAP-20190307-0004, oCERT-2011-003, openSUSE-SU-2012:0262-1, PM53930, RHSA-2012:1604-01, RHSA-2012:1605-01, RHSA-2012:1606-01, RHSA-2013:1455-01, RHSA-2013:1456-01, sk66350, VIGILANCE-VUL-11254, VU#903934.
Full Vigil@nce bulletin... (Free trial)

Description of the vulnerability

A hash table stores information, as keys pointing to values. Each key is converted to an integer, which is the index of the area where to store data. For example:
 - keyA is converted to 34
 - keyB is converted to 13
Data are then stored at offsets 34 and 13.

In most cases, these keys generate integers which are uniformly located in the storage area (which runs for example between 0 and 99). However, if an attacker computes his keys in such a way that they are converted to the same integer (for example 34), all data are stored at the same location (at the index 34). The access time to these data is thus very large.

A posted HTTP form is used to send a lot of variables. For example: var1=a, var2=b, etc. Web servers store these variables in a hash table. However, if the attacker computes his keys (variable names) in such a way that they are all stored at the same place, he can overload the server.

Other features, such as a JSON parser or additional services, can also be used as an attack vector.

The following products are also impacted:
 - Apache APR (VIGILANCE-VUL-11380)
 - Apache Xerces-C++ (VIGILANCE-VUL-15082)
 - Apache Xerces Java (VIGILANCE-VUL-15083)
 - expat (VIGILANCE-VUL-11420)
 - Java Lightweight HTTP Server (VIGILANCE-VUL-11381)
 - Java Language (VIGILANCE-VUL-11715)
 - libxml2 (VIGILANCE-VUL-11384)
 - PHP (VIGILANCE-VUL-11379)
 - Python (VIGILANCE-VUL-11416)
 - Ruby (VIGILANCE-VUL-11382)
 - Tomcat (VIGILANCE-VUL-11383)

An attacker can therefore send data generating storage collisions, in order to overload a service.
Full Vigil@nce bulletin... (Free trial)
Our database contains other pages. You can request a free trial to read them.

Display information about Check Point Endpoint Security: