Lucene search

K
cve[email protected]CVE-2012-2753
HistoryOct 03, 2022 - 4:15 p.m.

CVE-2012-2753

2022-10-0316:15:36
web.nvd.nist.gov
64
cve-2012-2753
check point endpoint security
epc gui
privilege escalation
vulnerability

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%

Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory.

Affected configurations

NVD
Node
checkpointendpoint_connectMatchr73
OR
checkpointendpoint_securityMatche80-vpn_blade
OR
checkpointendpoint_securityMatche80.10-vpn_blade
OR
checkpointendpoint_securityMatche80.20-vpn_blade
OR
checkpointendpoint_securityMatche80.30-vpn_blade
OR
checkpointendpoint_securityMatchr73
OR
checkpointendpoint_security_vpnMatchr75
OR
checkpointremote_access_clientsMatche75
OR
checkpointremote_access_clientsMatche75.10
OR
checkpointremote_access_clientsMatche75.20

6.9 Medium

CVSS2

Attack Vector

LOCAL

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:M/Au:N/C:C/I:C/A:C

6.7 Medium

AI Score

Confidence

Low

0.0004 Low

EPSS

Percentile

5.1%