cve,link,title,description,vendor,products,score,severity,epss,cisa,article,ransomware,exploited,poc,trended,trended_no_1,published,trended_score CVE-2024-24919,https://securityvulnerability.io/vulnerability/CVE-2024-24919,Check Point Security Gateways Vulnerability Allows Remote Access Attacks,"A vulnerability exists within Check Point Security Gateways that could allow attackers to access sensitive information once the device is connected to the internet, specifically when the remote Access VPN or Mobile Access Software Blades are enabled. This could pose significant risks to network integrity and confidentiality, particularly if exploited by malicious actors. Check Point has released a security fix to address this issue, urging users to apply the update to safeguard their systems.",Checkpoint,"Check Point Quantum Gateway, Spark Gateway And Cloudguard Network",8.6,HIGH,0.9581800103187561,true,true,true,true,true,true,true,2024-05-28T18:22:19.401Z,110353 CVE-2022-23742,https://securityvulnerability.io/vulnerability/CVE-2022-23742,,"Check Point Endpoint Security Client for Windows versions earlier than E86.40 copy files for forensics reports from a directory with low privileges. An attacker can replace those files with malicious or linked content, such as exploiting CVE-2020-0896 on unpatched systems or using symbolic links.",Checkpoint,Check Point Endpoint Security Client For Windows,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2022-05-12T19:23:18.000Z,0 CVE-2021-30361,https://securityvulnerability.io/vulnerability/CVE-2021-30361,,The Check Point Gaia Portal's GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS.,Checkpoint,Check Point Gaia Portal,6.7,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2022-05-11T16:42:52.000Z,0 CVE-2021-30360,https://securityvulnerability.io/vulnerability/CVE-2021-30360,,"Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.",Checkpoint,Check Point Remote Access Client,7.8,HIGH,0.0004799999878741801,false,false,false,false,,false,false,2022-01-10T14:10:00.000Z,0 CVE-2021-30359,https://securityvulnerability.io/vulnerability/CVE-2021-30359,,"The Harmony Browse and the SandBlast Agent for Browsers installers must have admin privileges to execute some steps during the installation. Because the MS Installer allows regular users to repair their installation, an attacker running an installer before 90.08.7405 can start the installation repair and place a specially crafted binary in the repair folder, which runs with the admin privileges.",Checkpoint,Check Point Harmony Browse And Sandblast Agent For Browsers,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2021-10-22T13:32:54.000Z,0 CVE-2021-30358,https://securityvulnerability.io/vulnerability/CVE-2021-30358,,Mobile Access Portal Native Applications who's path is defined by the administrator with environment variables may run applications from other locations by the Mobile Access Portal Agent.,Checkpoint,Check Point Mobile Access Portal Agent,7.2,HIGH,0.001180000021122396,false,false,false,false,,false,false,2021-10-19T13:32:46.000Z,0 CVE-2021-30356,https://securityvulnerability.io/vulnerability/CVE-2021-30356,,"A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files.",Checkpoint,Check Point Identity Agent,8.1,HIGH,0.0008099999977275729,false,false,false,false,,false,false,2021-04-22T17:37:06.000Z,0 CVE-2020-6024,https://securityvulnerability.io/vulnerability/CVE-2020-6024,,"Check Point SmartConsole before R80.10 Build 185, R80.20 Build 119, R80.30 before Build 94, R80.40 before Build 415, and R81 before Build 548 were vulnerable to a possible local privilege escalation due to running executables from a directory with write access to all authenticated users.",Checkpoint,Check Point Smartconsole,7.8,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2021-01-20T18:17:53.000Z,0 CVE-2020-6021,https://securityvulnerability.io/vulnerability/CVE-2020-6021,,"Check Point Endpoint Security Client for Windows before version E84.20 allows write access to the directory from which the installation repair takes place. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted DLL in the repair folder which will run with the Endpoint client’s privileges.",Checkpoint,Check Point Endpoint Security Client For Windows,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-12-03T13:31:22.000Z,0 CVE-2020-6015,https://securityvulnerability.io/vulnerability/CVE-2020-6015,,Check Point Endpoint Security for Windows before E84.10 can reach denial of service during clean install of the client which will prevent the storage of service log files in non-standard locations.,Checkpoint,Check Point Endpoint Security For Windows,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2020-11-05T19:37:06.000Z,0 CVE-2020-6014,https://securityvulnerability.io/vulnerability/CVE-2020-6014,,"Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.",Checkpoint,Check Point Endpoint Security Client For Windows,6.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2020-10-30T14:22:05.000Z,0 CVE-2020-6023,https://securityvulnerability.io/vulnerability/CVE-2020-6023,,Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware.,Checkpoint,Check Point Zonealarm,7.8,HIGH,0.0004400000034365803,false,false,false,false,,false,false,2020-10-27T13:52:57.000Z,0 CVE-2020-6022,https://securityvulnerability.io/vulnerability/CVE-2020-6022,,Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware.,Checkpoint,Check Point Zonealarm,5.5,MEDIUM,0.0004400000034365803,false,false,false,false,,false,false,2020-10-27T13:50:50.000Z,0 CVE-2020-6013,https://securityvulnerability.io/vulnerability/CVE-2020-6013,,ZoneAlarm Firewall and Antivirus products before version 15.8.109.18436 allow an attacker who already has access to the system to execute code at elevated privileges through a combination of file permission manipulation and exploitation of Windows CVE-2020-00896 on unpatched systems.,Checkpoint,Check Point Zonealarm,8.8,HIGH,0.0011899999808520079,false,false,false,false,,false,false,2020-07-06T17:54:48.000Z,0 CVE-2019-8462,https://securityvulnerability.io/vulnerability/CVE-2019-8462,,"In a rare scenario, Check Point R80.30 Security Gateway before JHF Take 50 managed by Check Point R80.30 Management crashes with a unique configuration of enhanced logging.",Checkpoint,Check Point Security Gateway,7.5,HIGH,0.0011599999852478504,false,false,false,false,,false,false,2019-10-02T16:37:41.000Z,0 CVE-2019-8461,https://securityvulnerability.io/vulnerability/CVE-2019-8461,,Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user.,Checkpoint,Check Point Endpoint Security Initial Client For Windows,7.8,HIGH,0.0013000000035390258,false,false,false,false,,false,false,2019-08-29T20:41:54.000Z,0 CVE-2019-8453,https://securityvulnerability.io/vulnerability/CVE-2019-8453,,Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions. This can allow a local attacker to replace a DLL file with a malicious one and cause Denial of Service to the client.,Checkpoint,Check Point Zonealarm,5.5,MEDIUM,0.0004199999966658652,false,false,false,false,,false,false,2019-04-17T14:06:40.000Z,0 CVE-2019-8455,https://securityvulnerability.io/vulnerability/CVE-2019-8455,,A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.,Checkpoint,Check Point Zonealarm,7.1,HIGH,0.0004199999966658652,false,false,false,false,,false,false,2019-04-17T14:05:54.000Z,0 CVE-2008-1397,https://securityvulnerability.io/vulnerability/CVE-2008-1397,,"Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint.",Checkpoint,"Vpn-1 Power Utm With Ngx,Check Point Vpn-1 Pro,Vpn-1,Vpn-1 Power Utm,Vpn-1 Firewall-1",,,0.007639999967068434,false,false,false,false,,false,false,2008-03-20T00:00:00.000Z,0 CVE-2005-3673,https://securityvulnerability.io/vulnerability/CVE-2005-3673,,"The Internet Key Exchange version 1 (IKEv1) implementation in Check Point products allows remote attackers to cause a denial of service via certain crafted IKE packets, as demonstrated by the PROTOS ISAKMP Test Suite for IKEv1. NOTE: due to the lack of details in the advisory, it is unclear which of CVE-2005-3666, CVE-2005-3667, and/or CVE-2005-3668 this issue applies to.",Checkpoint,"Check Point,Vpn-1 Firewall-1 Next Generation,Firewall-1,Vpn-1,Express",,,0.035509999841451645,false,false,false,false,,false,false,2005-11-18T21:00:00.000Z,0 CVE-2002-0428,https://securityvulnerability.io/vulnerability/CVE-2002-0428,,"Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the ""authentication timeout"" by modifying the to_expire or expire values in the client's users.C configuration file.",Checkpoint,"Check Point Vpn,Firewall-1,Next Generation",,,0.007569999899715185,false,false,false,false,,false,false,2002-08-12T04:00:00.000Z,0