CVE-2023-28134

7.8 HIGH

📋 TL;DR

CVE-2023-28134 is a local privilege escalation vulnerability in Check Point Harmony Endpoint and ZoneAlarm Extreme Security. An attacker with low-privileged code execution on a system can exploit this to gain elevated privileges. This affects organizations using these security products on their endpoints.

💻 Affected Systems

Products:
  • Check Point Harmony Endpoint
  • ZoneAlarm Extreme Security
Versions: Versions prior to E86.40
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Requires local access or ability to execute low-privileged code first.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker gains full SYSTEM/root privileges on the endpoint, allowing complete control, data theft, lateral movement, and persistence.

🟠

Likely Case

Malware or compromised user accounts escalate privileges to bypass security controls, install additional malware, or access sensitive data.

🟢

If Mitigated

With proper patching and least privilege principles, impact is limited to isolated endpoints with minimal data exposure.

🌐 Internet-Facing: LOW
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires initial low-privileged access; no public exploit code known.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: E86.40 and later

Vendor Advisory: https://support.checkpoint.com/results/sk/sk181597

Restart Required: Yes

Instructions:

1. Update Check Point Harmony Endpoint/ZoneAlarm to version E86.40 or later via the management console. 2. Deploy updates to all endpoints. 3. Restart affected systems.

🔧 Temporary Workarounds

Restrict local user privileges

windows

Apply least privilege principles to limit low-privileged code execution opportunities.

🧯 If You Can't Patch

  • Monitor for suspicious privilege escalation attempts using endpoint detection tools.
  • Isolate affected systems from critical network segments to limit lateral movement.

🔍 How to Verify

Check if Vulnerable:

Check the installed version of Check Point Harmony Endpoint/ZoneAlarm via the client interface or management console.

Check Version:

Not applicable; use GUI or management console.

Verify Fix Applied:

Confirm version is E86.40 or later in the product interface.

📡 Detection & Monitoring

Log Indicators:

  • Unexpected process elevation events
  • Security product service anomalies

Network Indicators:

  • Unusual outbound connections from endpoints post-exploit

SIEM Query:

Endpoint logs showing privilege escalation from low to high integrity levels.

🔗 References

📤 Share & Export