Check Point Endpoint Security Client for Windows, with Anti-Malware blade installed, before version E81.00, tries to load a non-existent DLL during an update initiated by the UI. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
View Full Alert
Related Posts
-
DR and IT Security Meet Finally22 Ideas and Questions to Prepare in Advance of Being Hacked Do you want to be radical and world class CIO a real Tier 1 Business CIO? Try this. Bring…
A Thesis for Handling Defensive Security [spp-transcript][/spp-transcript] In this CIO Innovation Insider, I wanted to share with you what I believe is an important step to take in managing your business’ advanced security systems.…