Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://supportcontent.checkpoint.com/solutions?id=sk168081 |
History
No history.
MITRE
Status: PUBLISHED
Assigner: checkpoint
Published: 2020-10-30T14:22:05
Updated: 2024-08-04T08:47:41.014Z
Reserved: 2020-01-07T00:00:00
Link: CVE-2020-6014
Vulnrichment
No data.
NVD
Status : Modified
Published: 2020-11-02T21:15:34.163
Modified: 2024-11-21T05:34:59.040
Link: CVE-2020-6014
Redhat
No data.