Vulnerability Name: | CVE-2022-41604 (CCN-237376) | ||||||||||||
Assigned: | 2022-09-26 | ||||||||||||
Published: | 2022-09-26 | ||||||||||||
Updated: | 2022-09-30 | ||||||||||||
Summary: | Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) 7.7 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:U/RL:O/RC:C)
5.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.8 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:S/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-269 | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2022-41604 Source: XF Type: UNKNOWN checkpoint-cve202241604-priv-esc(237376) Source: CCN Type: ZoneAlarm GIT Repository ZoneAlarmEoP Source: MISC Type: Exploit, Release Notes, Third Party Advisory https://github.com/Wh04m1001/ZoneAlarmEoP Source: CCN Type: Check Point Web site Check Point Products' Acknowledgments Source: MISC Type: Third Party Advisory https://www.infigo.hr/en/insights/39/elevation-of-privilege-in-zonealarm-extreme-security/ Source: MISC Type: Release Notes, Vendor Advisory https://www.zonealarm.com/software/extreme-security/release-history | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |