Privilege Escalation via Weak Permissions and Self-Protection Driver Bypass in Check Point ZoneAlarm Extreme Security

Privilege Escalation via Weak Permissions and Self-Protection Driver Bypass in Check Point ZoneAlarm Extreme Security

CVE-2022-41604 · HIGH Severity

CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H

Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.

Learn more about our Cis Benchmark Audit For Check Point Firewall.