![]() Threat actors commonly exploit this type of vulnerability during the later stage of their attacks, after the target machine was already infiltrated and they need to elevate permissions to establish persistence and further compromise the targeted machine.Ĭheck Point Endpoint Security is a software that comes with multiple modules, including data and network security, advanced threat prevention and forensics, as well as remote access VPN software solutions, with parts of it being executed as a Windows service with top level NT AUTHORITY\SYSTEM permissions. ![]() The privilege escalation security flaw tracked as CVE-2019-8461 makes it possible for attackers to run malicious payloads using system-level privileges as well as evade anti-malware detection by bypassing application whitelisting, a technique commonly used to prevent the execution of either unknown or potentially malicious apps. Check Point Software patched a vulnerability discovered in its Endpoint Security Initial Client software for Windows allowing potential attackers to escalate privileges and execute code using SYSTEM privileges.
0 Comments
Leave a Reply. |