Loading
Generated remediation guidance and an executive summary. No account required.
Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.
Use CWE-269, Checkpoint vendor hub and Zonealarm product page to widen CVE-2022-41604 into its surrounding weakness, vendor, and product context.
Compare it with CVE-2022-23743, CVE-2020-6023 and CVE-2019-8452 for nearby disclosures in the same product family.