Check Point Patches Privilege Escalation Flaw in Endpoint Client

Check Point Software patched a vulnerability discovered in its Endpoint Security Initial Client software for Windows allowing potential attackers to escalate privileges and execute code using SYSTEM privileges.

The privilege escalation security flaw tracked as CVE-2019-8461 makes it possible for attackers to run malicious payloads using system-level privileges as well as evade anti-malware detection by bypassing application whitelisting, a technique commonly used to prevent the execution of either unknown or potentially malicious apps.

Threat actors commonly exploit this type of vulnerability during the later stage of their attacks, after the target machine was already infiltrated and they need to elevate permissions to establish persistence and further compromise the targeted machine.

Check Point Endpoint Security is a software that comes with multiple modules, including data and network security, advanced threat prevention and forensics, as well as remote access VPN software solutions, with parts of it being executed as a Windows service with top level NT AUTHORITY\SYSTEM permissions.

Loading arbitrary unsigned DLLs

SafeBreach Labs security researcher Peleg Hadar found that the security issue "could be used in order to achieve privilege escalation and persistence by loading an arbitrary unsigned DLL" into one of the Windows services used by the Check Point Endpoint Security software.

The vulnerability is induced by the lack of safe DLL loading caused by the use of an uncontrolled search path and by not validating if the DLLs it loads is signed with a digital certificate as Hadar details.

The researcher discovered that the Check Point Device Auxiliary Framework Service — one of the services used by the targeted software that runs with SYSTEM privileges and with an executable signed by Check Point — would attempt to load a missing DLL named atl110.dll from various folders within the Windows PATH environment variable.

One of the directories probed by the service was C:/python27, a folder which comes with an access control list (ACL) providing any authenticated user with write permissions. 

This allowed the researcher to load an unsigned DLL's privileges after loading it as a regular user, with the end result being that his code was executed from within a process digitally signed by Check Point as NT AUTHORITY\SYSTEM.

Check Point patched this vulnerability with the release of Endpoint Security Initial Client for Windows version E81.30 on August 27, following the vulnerability disclosure report sent by Hadar on August 1.

Check Point Endpoint Security Initial Client for Windows before version E81.30 tries to load a DLL placed in any PATH location on a clean image without Endpoint Client installed. An attacker can leverage this to gain LPE using a specially crafted DLL placed in any PATH location accessible with write permissions to the user. - Check Point

This is the third local privilege escalation vulnerability reported by Hadar to a security vendor during August after he found two more affecting Trend Micro's Password Manager and the free version of Bitdefender Antivirus.

Both of them could be exploited by attackers to load and execute malicious payloads in a persistent way and potentially evading detection during later stages of an attack.

Trend Micro and Bitdefender patched the security flaws (tracked as CVE-2019-14684 and CVE-2019-15295) after receiving Hadar's disclosure reports, with users receiving the updates via the automatic update features built within the two apps.

Related Articles:

WP Automatic WordPress plugin hit by millions of SQL injection attacks

Maximum severity Flowmon bug has a public exploit, patch now

Microsoft: APT28 hackers exploit Windows flaw reported by NSA

CrushFTP warns users to patch exploited zero-day “immediately”

Critical Forminator plugin flaw impacts over 300k WordPress sites