Vulmon
Recent Vulnerabilities
Product List
Research Posts
Trends
Blog
About
Contact
Vulmon Alerts
By Relevance
By Risk Score
By Publish Date
checkpoint endpoint security vulnerabilities and exploits
(subscribe to this query)
4.6
CVSSv2
CVE-2022-23742
Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or usin...
Checkpoint Endpoint Security
7.2
CVSSv2
CVE-2021-30360
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote A...
Checkpoint Endpoint Security
3.5
CVSSv2
CVE-2019-8458
Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Poi...
Checkpoint Endpoint Security Clients
Checkpoint Remote Access Clients
Checkpoint Capsule Docs
NA
CVE-2023-28133
Local privilege escalation in Check Point Endpoint Security Client (version E87.30) via crafted OpenSSL configuration file
Checkpoint Endpoint Security E87.30
5
CVSSv2
CVE-2019-8463
A denial of service vulnerability was reported in Check Point Endpoint Security Client for Windows before E82.10, that could allow service log file to be written to non-standard locations.
Checkpoint Endpoint Security Clients
2.1
CVSSv2
CVE-2020-6015
Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations.
Checkpoint Endpoint Security E84.10
6.8
CVSSv2
CVE-2019-8461
Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location a...
Checkpoint Endpoint Security
Checkpoint Capsule Docs Standalone Client
Checkpoint Remote Access Clients
4.3
CVSSv2
CVE-2013-7304
Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle malicious users to spoof SSL servers by presenting an arbitrary certificate during a session established by a client...
Checkpoint Endpoint Security Mi Server R73
6.5
CVSSv2
CVE-2008-1397
Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one...
Checkpoint Vpn-1 Power Utm With Ngx R65
Checkpoint Check Point Vpn-1 Pro Ngx R61
Checkpoint Vpn-1 Ngx R60
Checkpoint Vpn-1 Power Utm Ngx R65 With Messaging Security
Checkpoint Vpn-1 Firewall-1 Ng Ai R55
Checkpoint Check Point Vpn-1 Pro Ngx R62 Ga
9.3
CVSSv2
CVE-2011-1827
Multiple unspecified vulnerabilities in Check Point SSL Network Extender (SNX), SecureWorkSpace, and Endpoint Security On-Demand, as distributed by SecurePlatform, IPSO6, Connectra, and VSX, allow remote malicious users to execute arbitrary code via vectors involving a (1) Active...
Checkpoint Vpn-1 Firewall-1 Vsx R65.20
Checkpoint Connectra Ngx R66.1
Checkpoint Vpn-1 Firewall-1 Vsx R67
Checkpoint Vpn-1 R75
Checkpoint Vpn-1 R71.30
Checkpoint Connectra Ngx R66.1n
Checkpoint Vpn-1 R65.70
Checkpoint Vpn-1 R70.40
CVSSv2
CVSSv2
CVSSv3
VMScore
Recommendations:
type confusion
IMAP
CVE-2024-36103
CVE-2024-28995
CVE-2024-37325
CVE-2024-30078
CVE-2024-30082
SQL injection
CVE-2024-30052
Vulnerability Notification Service
You don’t have to wait for vulnerability scanning results
Get Started
« PREV
1
2
3
NEXT »