Users have access to the directory where the installation...
High severity
Unreviewed
Published
Jan 11, 2022
to the GitHub Advisory Database
•
Updated Feb 3, 2023
Description
Published by the National Vulnerability Database
Jan 10, 2022
Published to the GitHub Advisory Database
Jan 11, 2022
Last updated
Feb 3, 2023
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
References