Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2020-6015 : What You Need to Know

Learn about CVE-2020-6015 affecting Check Point Endpoint Security for Windows before E84.10, leading to denial of service during client installation and log file storage issues.

Check Point Endpoint Security for Windows before E84.10 can experience denial of service during a clean client installation, leading to the prevention of service log files storage in non-standard locations.

Understanding CVE-2020-6015

This CVE involves a vulnerability in Check Point Endpoint Security for Windows that can result in denial of service.

What is CVE-2020-6015?

CVE-2020-6015 is a vulnerability in Check Point Endpoint Security for Windows before version E84.10 that can lead to denial of service during the clean installation of the client, causing the inability to store service log files in non-standard locations.

The Impact of CVE-2020-6015

The vulnerability can disrupt the normal operation of Check Point Endpoint Security for Windows, potentially affecting the availability and integrity of service log files.

Technical Details of CVE-2020-6015

This section provides detailed technical information about the vulnerability.

Vulnerability Description

The vulnerability in Check Point Endpoint Security for Windows before E84.10 allows for denial of service during the clean installation of the client, resulting in the prevention of service log files storage in non-standard locations.

Affected Systems and Versions

        Product: Check Point Endpoint Security for Windows
        Versions Affected: Before E84.10

Exploitation Mechanism

The vulnerability can be exploited during the clean installation process of the client, causing a denial of service and hindering the storage of service log files.

Mitigation and Prevention

To address CVE-2020-6015, follow these mitigation and prevention steps:

Immediate Steps to Take

        Upgrade Check Point Endpoint Security for Windows to version E84.10 or later.
        Regularly monitor service log files for any unusual activity.

Long-Term Security Practices

        Implement secure installation procedures for software updates.
        Conduct regular security assessments to identify and address vulnerabilities.

Patching and Updates

        Apply patches and updates provided by Check Point to fix the vulnerability and enhance system security.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now