Check Point Endpoint Security Client for Windows, with Anti-Bot or Threat Emulation blades installed, before version E83.20, tries to load a non-existent DLL during a query for the Domain Name. An attacker with administrator privileges can leverage this to gain code execution within a Check Point Software Technologies signed binary, where under certain circumstances may cause the client to terminate.
[
{
"product": "Check Point Endpoint Security Client for Windows",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before E83.20"
}
]
}
]