Learn about CVE-2020-6014, a vulnerability in Check Point Endpoint Security Client for Windows before E83.20 that allows code execution. Find mitigation steps and update information here.
Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, has a vulnerability that could allow an attacker to execute arbitrary code within a signed binary.
Understanding CVE-2020-6014
This CVE involves a DLL loading issue in Check Point Endpoint Security Client for Windows, potentially leading to code execution.
What is CVE-2020-6014?
CVE-2020-6014 is a vulnerability in Check Point Endpoint Security Client for Windows that could be exploited by an attacker with administrator privileges to execute code within a signed binary.
The Impact of CVE-2020-6014
The vulnerability may allow an attacker to gain code execution within the Check Point software, potentially causing the client to terminate.
Technical Details of CVE-2020-6014
Check Point Endpoint Security Client for Windows is affected by this vulnerability.
Vulnerability Description
The software, before version E83.20, attempts to load a non-existent DLL during a Domain Name query, enabling an attacker to execute code within a signed binary.
Affected Systems and Versions
Exploitation Mechanism
Mitigation and Prevention
It is crucial to take immediate steps to address and prevent exploitation of this vulnerability.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates