CVE Vulnerabilities

CVE-2022-23744

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Jul 07, 2022 | Modified: Nov 21, 2024
CVSS 3.x
2.3
LOW
Source:
NVD
CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
CVSS 2.x
2.1 LOW
AV:L/AC:L/Au:N/C:N/I:N/A:P
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

Check Point Endpoint before version E86.50 failed to protect against specific registry change which allowed to disable endpoint protection by a local administrator.

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

NameVendorStart VersionEnd Version
Endpoint_securityCheckpointe83 (including)e83 (including)
Endpoint_securityCheckpointe84 (including)e84 (including)
Endpoint_securityCheckpointe85 (including)e85 (including)
Endpoint_securityCheckpointe86.10 (including)e86.10 (including)
Endpoint_securityCheckpointe86.20 (including)e86.20 (including)
Endpoint_securityCheckpointe86.30 (including)e86.30 (including)
Endpoint_securityCheckpointe86.40 (including)e86.40 (including)
Harmony_endpointCheckpointe83 (including)e83 (including)
Harmony_endpointCheckpointe84 (including)e84 (including)
Harmony_endpointCheckpointe85 (including)e85 (including)
Harmony_endpointCheckpointe86.10 (including)e86.10 (including)
Harmony_endpointCheckpointe86.20 (including)e86.20 (including)
Harmony_endpointCheckpointe86.30 (including)e86.30 (including)
Harmony_endpointCheckpointe86.40 (including)e86.40 (including)

Potential Mitigations

References