6 vulnerabilities classified as CWE-65 (Windows硬链接). AI Chinese analysis included.
CWE-65 represents a path traversal weakness where software fails to validate whether a file or directory name resolves to a hard link pointing outside its intended control sphere. Attackers typically exploit this by creating hard links to sensitive system files or directories, tricking the application into operating on unauthorized resources. This bypasses access controls, potentially allowing data exfiltration, modification, or denial of service. To mitigate this risk, developers must implement rigorous input validation that resolves symbolic and hard links before processing. Utilizing operating system APIs that detect link targets and ensuring applications operate within strict chroot or sandboxed environments helps prevent unintended access. Additionally, verifying that the resolved path remains within the expected directory hierarchy is crucial for maintaining security boundaries and preventing privilege escalation through link manipulation.
| CVE ID | Title | CVSS | Severity | Published |
|---|---|---|---|---|
| CVE-2022-23742 | Check Point Endpoint Security Client后置链接漏洞 — Check Point Endpoint Security Client for Windows | 7.8 | - | 2022-05-12 |
| CVE-2020-6013 | Check Point ZoneAlarm 安全漏洞 — Check Point ZoneAlarm | 8.8 | - | 2020-07-06 |
| CVE-2019-19231 | Broadcom CA Client Automation 安全漏洞 — CA Client Automation | 7.3 | High | 2019-12-20 |
| CVE-2019-8454 | Check Point Endpoint Security 后置链接漏洞 — Check Point Endpoint Security client for Windows | 7.0 | - | 2019-04-29 |
| CVE-2019-8452 | Check Point ZoneAlarm 后置链接漏洞 — Check Point ZoneAlarm | 7.8 | - | 2019-04-22 |
| CVE-2019-8455 | Check Point ZoneAlarm 后置链接漏洞 — Check Point ZoneAlarm | 7.1 | - | 2019-04-17 |
Vulnerabilities classified as CWE-65 (Windows硬链接) represent 6 CVEs. The CWE taxonomy describes the weakness; review individual CVEs for product-specific impact.