{"api_version":"1","generated_at":"2026-04-23T06:20:19+00:00","cve":"CVE-2021-30360","urls":{"html":"https://cve.report/CVE-2021-30360","api":"https://cve.report/api/cve/CVE-2021-30360.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2021-30360","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2021-30360"},"summary":{"title":"CVE-2021-30360","description":"Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.","state":"PUBLIC","assigner":"cve@checkpoint.com","published_at":"2022-01-10 14:10:00","updated_at":"2022-01-14 16:43:00"},"problem_types":["CWE-427"],"metrics":[],"references":[{"url":"https://supportcontent.checkpoint.com/solutions?id=sk176853","name":"https://supportcontent.checkpoint.com/solutions?id=sk176853","refsource":"MISC","tags":[],"title":"Enterprise Endpoint Security E86.20 Windows Clients","mime":"text/html","httpstatus":"200","archivestatus":"404"},{"url":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0001/MNDT-2022-0001.md","name":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0001/MNDT-2022-0001.md","refsource":"MISC","tags":[],"title":"Vulnerability-Disclosures/MNDT-2022-0001.md at master · mandiant/Vulnerability-Disclosures · GitHub","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2021-30360","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2021-30360","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2021","cve_id":"30360","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkpoint","cpe5":"endpoint_security","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"windows","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"data_type":"CVE","data_format":"MITRE","data_version":"4.0","CVE_data_meta":{"ID":"CVE-2021-30360","ASSIGNER":"cve@checkpoint.com","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"vendor_name":"n/a","product":{"product_data":[{"product_name":"Check Point Remote Access Client","version":{"version_data":[{"version_value":"before E86.20"}]}}]}}]}},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-427: Uncontrolled Search Path Element"}]}]},"references":{"reference_data":[{"refsource":"MISC","name":"https://supportcontent.checkpoint.com/solutions?id=sk176853","url":"https://supportcontent.checkpoint.com/solutions?id=sk176853"},{"refsource":"MISC","name":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0001/MNDT-2022-0001.md","url":"https://github.com/mandiant/Vulnerability-Disclosures/blob/master/2022/MNDT-2022-0001/MNDT-2022-0001.md"}]},"description":{"description_data":[{"lang":"eng","value":"Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges."}]}},"nvd":{"publishedDate":"2022-01-10 14:10:00","lastModifiedDate":"2022-01-14 16:43:00","problem_types":["CWE-427"],"metrics":{"baseMetricV3":{"cvssV3":{"version":"3.1","vectorString":"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H","attackVector":"LOCAL","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"HIGH","availabilityImpact":"HIGH","baseScore":7.8,"baseSeverity":"HIGH"},"exploitabilityScore":1.8,"impactScore":5.9},"baseMetricV2":{"cvssV2":{"version":"2.0","vectorString":"AV:L/AC:L/Au:N/C:C/I:C/A:C","accessVector":"LOCAL","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE","baseScore":7.2},"severity":"HIGH","exploitabilityScore":3.9,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}},"configurations":{"CVE_data_version":"4.0","nodes":[{"operator":"OR","children":[],"cpe_match":[{"vulnerable":true,"cpe23Uri":"cpe:2.3:a:checkpoint:endpoint_security:*:*:*:*:*:windows:*:*","versionEndExcluding":"e86.20","cpe_name":[]}]}]}},"legacy_mitre":{"record":{"CveYear":"2021","CveId":"30360","Ordinal":"205615","Title":"CVE-2021-30360","CVE":"CVE-2021-30360","Year":"2021"},"notes":[{"CveYear":"2021","CveId":"30360","Ordinal":"1","NoteData":"Users have access to the directory where the installation repair occurs. Since the MS Installer allows regular users to run the repair, an attacker can initiate the installation repair and place a specially crafted EXE in the repair folder which runs with the Check Point Remote Access Client privileges.","Type":"Description","Title":null},{"CveYear":"2021","CveId":"30360","Ordinal":"2","NoteData":"2022-01-07","Type":"Other","Title":"Published"},{"CveYear":"2021","CveId":"30360","Ordinal":"3","NoteData":"2022-01-10","Type":"Other","Title":"Modified"}]}}}