CVE-2019-8459

moderate-risk
Published 2019-06-20

Check Point Endpoint Security Client for Windows, with the VPN blade, before version E80.83, starts a process without using quotes in the path. This can cause loading of a previously placed executable with a name similar to the parts of the path, instead of the intended one.

Do I need to act?

-
0.50% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.8/10 Critical
NETWORK / LOW complexity

Affected Products (7)

Jumbo Hotfix For Endpoint Security Server
Endpoint Security Server Package
Smartconsole For Endpoint Security Server
Smartconsole For Endpoint Security Server
Endpoint Security Clients
Remote Access Clients
Capsule Docs Standalone Client

Affected Vendors

48
/ 100
moderate-risk
Severity 32/34 · Critical
Exploitability 2/34 · Minimal
Exposure 14/34 · Moderate