Uncontrolled Search Path Element Vulnerability for Check Point Endpoint Security
Description
Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.
Affected Applications
Check Point Endpoint Security