Vulnerability Description
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Checkpoint | Endpoint Security | < e86.20 |
Related Weaknesses (CWE)
References
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022ExploitThird Party Advisory
- https://supportcontent.checkpoint.com/solutions?id=sk176853ProductVendor Advisory
- https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022ExploitThird Party Advisory
- https://supportcontent.checkpoint.com/solutions?id=sk176853ProductVendor Advisory
FAQ
What is CVE-2021-30360?
CVE-2021-30360 is a vulnerability with a CVSS score of 7.8 (HIGH). Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a spe...
How severe is CVE-2021-30360?
CVE-2021-30360 has been rated HIGH with a CVSS base score of 7.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2021-30360?
Check the references section above for vendor advisories and patch information. Affected products include: Checkpoint Endpoint Security.