CVE-2025-9142

7.5 HIGH

📋 TL;DR

This vulnerability allows a local user on a Windows system to manipulate the Harmony SASE client to write or delete files outside its intended certificate directory. This affects Windows systems running vulnerable versions of the Harmony SASE client software. Attackers with local access can potentially modify system files or configuration data.

💻 Affected Systems

Products:
  • Check Point Harmony SASE Windows Client
Versions: Versions prior to the fix (specific version numbers not provided in reference)
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects Windows installations of the Harmony SASE client. Requires local user access to the system.

⚠️ Manual Verification Required

This CVE does not have specific version information in our database, so automatic vulnerability detection cannot determine if your system is affected.

Why? The CVE database entry doesn't specify which versions are vulnerable (no version ranges provided by the vendor/NVD).

🔒 Custom verification scripts are available for registered users. Sign up free to download automated test scripts.

Recommended Actions:
  1. Review the CVE details at NVD
  2. Check vendor security advisories for your specific version
  3. Test if the vulnerability is exploitable in your environment
  4. Consider updating to the latest version as a precaution

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker could delete critical system files, modify configuration to disable security controls, or plant malicious executables that execute with client privileges, potentially leading to system compromise or data loss.

🟠

Likely Case

Local users could tamper with client configuration files, certificate stores, or log files to disrupt SASE functionality, bypass security policies, or maintain persistence on the system.

🟢

If Mitigated

With proper access controls and monitoring, impact is limited to disruption of the SASE client functionality without broader system compromise.

🌐 Internet-Facing: LOW - This requires local access to the Windows system, not directly exploitable over the internet.
🏢 Internal Only: HIGH - Local attackers or malicious insiders with access to Windows workstations running the vulnerable client can exploit this vulnerability.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires local access to the Windows system. The vulnerability is a path traversal issue (CWE-22) that can be triggered by a local user.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Refer to Check Point SK184557 for specific fixed versions

Vendor Advisory: https://support.checkpoint.com/results/sk/sk184557

Restart Required: Yes

Instructions:

1. Review Check Point SK184557 advisory. 2. Download and install the latest Harmony SASE Windows client from official Check Point sources. 3. Restart the system after installation.

🔧 Temporary Workarounds

Restrict Local User Access

windows

Limit local user accounts on systems running Harmony SASE client to trusted personnel only

Monitor File System Changes

windows

Implement file integrity monitoring on the certificate working directory and parent directories

🧯 If You Can't Patch

  • Implement strict access controls to limit which users can log into systems running the vulnerable client
  • Deploy application whitelisting to prevent execution of unauthorized files that might be planted via this vulnerability

🔍 How to Verify

Check if Vulnerable:

Check the Harmony SASE client version and compare against the fixed versions listed in SK184557

Check Version:

Check Harmony SASE client interface or system information for version details

Verify Fix Applied:

Verify the installed Harmony SASE client version matches or exceeds the fixed version specified in the advisory

📡 Detection & Monitoring

Log Indicators:

  • Unexpected file write or delete operations in the Harmony SASE certificate directory or parent paths
  • Access denied errors for file operations outside intended directories

Network Indicators:

  • None - this is a local file system vulnerability

SIEM Query:

Windows Security Event ID 4663 (File system access) targeting paths outside the expected Harmony SASE certificate directory

🔗 References

📤 Share & Export