Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2021-30360

EPSS 0.13% · P31
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2021-30360

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
对搜索路径元素未加控制
Source: NVD (National Vulnerability Database)
Vulnerability Title
Enterprise Endpoint Security 代码问题漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Check Point Enterprise Endpoint Security是以色列Check Point公司的一种专注于传统端点和现代移动设备的高级防护。 Enterprise Endpoint Security E86.20 Windows Clients 存在安全漏洞,该漏洞源于用户可以访问发生安装修复的目录。 由于 MS 安装程序允许普通用户运行修复,攻击者可以启动安装修复并将特制的 EXE 放置在以 Check Point 远程访问客户端权限运行的修复文件夹中。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
-Check Point Remote Access Client before E86.20 -

II. Public POCs for CVE-2021-30360

#POC DescriptionSource LinkShenlong Link
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2021-30360

登录查看更多情报信息。

Same Patch Batch · n/a · 2022-01-07 · 37 CVEs total

CVE-2021-235439.8 CRITICALSandbox Bypass
CVE-2021-235949.8 CRITICALSandbox Bypass
CVE-2021-235687.3 HIGHPrototype Pollution
CVE-2021-46054Binaryen 安全漏洞
CVE-2022-22701PartKeepr 信息泄露漏洞
CVE-2022-22702PartKeepr 代码问题漏洞
CVE-2021-46048Binaryen 安全漏洞
CVE-2021-46050Binaryen 缓冲区错误漏洞
CVE-2021-46052Binaryen 安全漏洞
CVE-2021-46053Binaryen 缓冲区错误漏洞
CVE-2021-22060Vmware Spring Framework 安全漏洞
CVE-2021-46055Binaryen 安全漏洞
CVE-2021-40041Huawei WS318n 跨站脚本漏洞
CVE-2021-40011Huawei Smartphone 资源管理错误漏洞
CVE-2021-40010HUAWEI HarmonyOS 缓冲区错误漏洞
CVE-2021-39993Huawei Smartphone 输入验证错误漏洞
CVE-2021-39998Huawei HarmonyOS和Huawei HarmonyOS Wearables 安全漏洞
CVE-2021-39996Huawei HarmonyOS Wearables 缓冲区错误漏洞
CVE-2022-21823Ivanti Workspace Control 安全漏洞
CVE-2021-44528Rails Action Pack 输入验证错误漏洞

Showing top 20 of 37 CVEs. View all on vendor page → →

IV. Related Vulnerabilities

V. Comments for CVE-2021-30360

No comments yet


Leave a comment