Vulnerabilites related to checkpoint - identity_agent
Vulnerability from fkie_nvd
Published
2021-04-22 18:15
Modified
2024-11-21 06:03
Severity ?
Summary
A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | identity_agent | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:identity_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "131908DA-33D7-43AF-8A1A-ABCA85954156", "versionEndExcluding": "r81.018.0000", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files." }, { "lang": "es", "value": "Se report\u00f3 una vulnerabilidad de Denegaci\u00f3n de Servicio en Check Point Identity Agent versiones anteriores a R81.018.0000, que podr\u00eda permitir a usuarios poco privilegiados sobrescribir archivos protegidos del sistema" } ], "id": "CVE-2021-30356", "lastModified": "2024-11-21T06:03:56.357", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "SINGLE", "availabilityImpact": "PARTIAL", "baseScore": 5.5, "confidentialityImpact": "NONE", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:L/Au:S/C:N/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.0, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.1, "baseSeverity": "HIGH", "confidentialityImpact": "NONE", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 5.2, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-04-22T18:15:08.480", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Vendor Advisory" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk134312" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk134312" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-59" } ], "source": "cve@checkpoint.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2024-04-18 18:15
Modified
2025-09-29 13:15
Severity ?
Summary
A local attacker can erscalate privileges on affected Check Point ZoneAlarm ExtremeSecurity NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system.
References
▼ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://support.checkpoint.com/results/sk/sk182219 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://support.checkpoint.com/results/sk/sk182219 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | identity_agent | * | |
checkpoint | zonealarm_extreme_security | * | |
microsoft | windows | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:identity_agent:*:*:*:*:*:*:*:*", "matchCriteriaId": "4F3A5ECE-1AB8-4453-8851-CD13ADAE75E6", "versionEndIncluding": "r81.070.0000", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:zonealarm_extreme_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "B9AF1ABD-2029-491D-8A75-513266E030BA", "versionEndExcluding": "4.2.7", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:microsoft:windows:-:*:*:*:*:*:*:*", "matchCriteriaId": "A2572D17-1DE6-457B-99CC-64AFD54487EA", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "A local attacker can erscalate privileges on affected Check Point ZoneAlarm ExtremeSecurity NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system." }, { "lang": "es", "value": "Un atacante local puede escalar privilegios en Check Point ZoneAlarm Extreme Security NextGen, Identity Agent para Windows y Identity Agent para Windows Terminal Server afectados. Para aprovechar esta vulnerabilidad, un atacante primero debe obtener la capacidad de ejecutar c\u00f3digo privilegiado local en el sistema de destino." } ], "id": "CVE-2024-24910", "lastModified": "2025-09-29T13:15:45.940", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.3, "impactScore": 5.9, "source": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "type": "Secondary" } ] }, "published": "2024-04-18T18:15:09.197", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk182219" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk182219" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-732" } ], "source": "cve@checkpoint.com", "type": "Secondary" } ] }
CVE-2024-24910 (GCVE-0-2024-24910)
Vulnerability from cvelistv5
Published
2024-04-18 17:35
Modified
2025-09-29 12:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-732 - :IncorrectPermissionAssignmentforCriticalResource
Summary
A local attacker can erscalate privileges on affected Check Point ZoneAlarm ExtremeSecurity NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
checkpoint | ZoneAlarmExtremeSecurityNextGen,IdentityAgentforWindows,IdentityAgentforWindowsTerminalServer |
Version: ZoneAlarmExtremeSecurityNextGen-versionslowerthan4.2.7,IdentityAgentforWindows-versionslowerthanR81.070.0000,IdentityAgentforWindowsTerminalServer-versionslowerthanR81.070.0000 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:checkpoint:identity_agent:-:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "identity_agent", "vendor": "checkpoint", "versions": [ { "lessThan": "R81.070.0000", "status": "affected", "version": "0", "versionType": "custom" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:zonealarm_extreme_security:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "zonealarm_extreme_security", "vendor": "checkpoint", "versions": [ { "lessThan": "4.2.7", "status": "affected", "version": "0", "versionType": "custom" } ] } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.3, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" } }, { "other": { "content": { "id": "CVE-2024-24910", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-04-25T19:46:15.022279Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-06-04T17:43:02.280Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" }, { "providerMetadata": { "dateUpdated": "2024-08-01T23:36:20.218Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_transferred" ], "url": "https://support.checkpoint.com/results/sk/sk182219" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "ZoneAlarmExtremeSecurityNextGen,IdentityAgentforWindows,IdentityAgentforWindowsTerminalServer", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "ZoneAlarmExtremeSecurityNextGen-versionslowerthan4.2.7,IdentityAgentforWindows-versionslowerthanR81.070.0000,IdentityAgentforWindowsTerminalServer-versionslowerthanR81.070.0000" } ] } ], "descriptions": [ { "lang": "en", "value": "A local attacker can erscalate privileges on affected Check Point ZoneAlarm ExtremeSecurity NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-732", "description": "CWE-732:IncorrectPermissionAssignmentforCriticalResource", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-09-29T12:30:45.141Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "url": "https://support.checkpoint.com/results/sk/sk182219" } ], "title": "LocalprivilegeescalationinCheckPointZoneAlarmExtremeSecurityNextGen,IdentityAgentforWindows,andIdentityAgentforWindowsTerminalServerviacraftedDLLfile" } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2024-24910", "datePublished": "2024-04-18T17:35:42.688Z", "dateReserved": "2024-02-01T15:19:26.278Z", "dateUpdated": "2025-09-29T12:30:45.141Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-30356 (GCVE-0-2021-30356)
Vulnerability from cvelistv5
Published
2021-04-22 17:37
Modified
2024-08-03 22:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-59 - Improper Link Resolution Before File Access ('Link Following')
Summary
A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files.
References
▼ | URL | Tags |
---|---|---|
https://supportcontent.checkpoint.com/solutions?id=sk134312 | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point Identity Agent |
Version: before R81.018.0000 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:32:40.978Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk134312" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point Identity Agent", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before R81.018.0000" } ] } ], "descriptions": [ { "lang": "en", "value": "A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-59", "description": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2021-04-22T17:37:06", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk134312" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2021-30356", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point Identity Agent", "version": { "version_data": [ { "version_value": "before R81.018.0000" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-59: Improper Link Resolution Before File Access (\u0027Link Following\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportcontent.checkpoint.com/solutions?id=sk134312", "refsource": "CONFIRM", "url": "https://supportcontent.checkpoint.com/solutions?id=sk134312" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2021-30356", "datePublished": "2021-04-22T17:37:06", "dateReserved": "2021-04-07T00:00:00", "dateUpdated": "2024-08-03T22:32:40.978Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }