CVE-2022-41604

Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.
Configurations

Configuration 1 (hide)

cpe:2.3:a:checkpoint:zonealarm:*:*:*:*:*:*:*:*

History

21 Nov 2024, 07:23

Type Values Removed Values Added
References () https://github.com/Wh04m1001/ZoneAlarmEoP - Exploit, Release Notes, Third Party Advisory () https://github.com/Wh04m1001/ZoneAlarmEoP - Exploit, Release Notes, Third Party Advisory
References () https://www.infigo.hr/en/insights/39/elevation-of-privilege-in-zonealarm-extreme-security/ - Third Party Advisory () https://www.infigo.hr/en/insights/39/elevation-of-privilege-in-zonealarm-extreme-security/ - Third Party Advisory
References () https://www.zonealarm.com/software/extreme-security/release-history - Release Notes, Vendor Advisory () https://www.zonealarm.com/software/extreme-security/release-history - Release Notes, Vendor Advisory

Information

Published : 2022-09-27 23:15

Updated : 2024-11-21 07:23


NVD link : CVE-2022-41604

Mitre link : CVE-2022-41604

CVE.ORG link : CVE-2022-41604


JSON object : View

Products Affected

checkpoint

  • zonealarm
CWE
CWE-269

Improper Privilege Management