ID

VAR-202101-1673


CVE

CVE-2020-6024


TITLE

Check Point SmartConsole  Vulnerability in privilege management

Trust: 0.8

sources: JVNDB: JVNDB-2020-015676

DESCRIPTION

Check Point SmartConsole before R80.10 Build 185, R80.20 Build 119, R80.30 before Build 94, R80.40 before Build 415, and R81 before Build 548 were vulnerable to a possible local privilege escalation due to running executables from a directory with write access to all authenticated users. Check Point SmartConsole Contains a privilege management vulnerability.Information is obtained, information is tampered with, and service is disrupted (DoS) It may be put into a state. Check Point Smartconsole is a desktop application software used to manage the Check point environment by Check Point Corporation in the United States

Trust: 1.8

sources: NVD: CVE-2020-6024 // JVNDB: JVNDB-2020-015676 // VULHUB: VHN-184149 // VULMON: CVE-2020-6024

AFFECTED PRODUCTS

vendor:checkpointmodel:smartconsolescope:eqversion:r80.20

Trust: 1.0

vendor:checkpointmodel:smartconsolescope:eqversion:r81

Trust: 1.0

vendor:checkpointmodel:smartconsolescope:eqversion:r80.30

Trust: 1.0

vendor:checkpointmodel:smartconsolescope:eqversion:r80.40

Trust: 1.0

vendor:checkpointmodel:smartconsolescope:lteversion:r80.10

Trust: 1.0

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:eqversion:r80.10 build 185

Trust: 0.8

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:eqversion: -

Trust: 0.8

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:ltversion:r81

Trust: 0.8

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:eqversion:build 548

Trust: 0.8

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:eqversion:r80.20 build 119

Trust: 0.8

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:eqversion:build 94

Trust: 0.8

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:ltversion:r80.30

Trust: 0.8

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:ltversion:r80.40

Trust: 0.8

vendor:チェック ポイント ソフトウェア テクノロジーズmodel:smartconsolescope:eqversion:build 415

Trust: 0.8

sources: JVNDB: JVNDB-2020-015676 // NVD: CVE-2020-6024

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2020-6024
value: HIGH

Trust: 1.0

NVD: CVE-2020-6024
value: HIGH

Trust: 0.8

CNNVD: CNNVD-202101-1562
value: HIGH

Trust: 0.6

VULHUB: VHN-184149
value: MEDIUM

Trust: 0.1

VULMON: CVE-2020-6024
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2020-6024
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-184149
severity: MEDIUM
baseScore: 4.6
vectorString: AV:L/AC:L/AU:N/C:P/I:P/A:P
accessVector: LOCAL
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 3.9
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2020-6024
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

NVD: CVE-2020-6024
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: LOW
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-184149 // VULMON: CVE-2020-6024 // JVNDB: JVNDB-2020-015676 // CNNVD: CNNVD-202101-1562 // NVD: CVE-2020-6024

PROBLEMTYPE DATA

problemtype:CWE-269

Trust: 1.1

problemtype:CWE-114

Trust: 1.0

problemtype:Improper authority management (CWE-269) [NVD Evaluation ]

Trust: 0.8

sources: VULHUB: VHN-184149 // JVNDB: JVNDB-2020-015676 // NVD: CVE-2020-6024

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-202101-1562

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-202101-1562

PATCH

title:sk142952url:https://supportcontent.checkpoint.com/solutions?id=sk142952

Trust: 0.8

title:Check Point Smartconsole Repair measures for privilege escalation vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=139933

Trust: 0.6

sources: JVNDB: JVNDB-2020-015676 // CNNVD: CNNVD-202101-1562

EXTERNAL IDS

db:NVDid:CVE-2020-6024

Trust: 2.6

db:JVNDBid:JVNDB-2020-015676

Trust: 0.8

db:CNNVDid:CNNVD-202101-1562

Trust: 0.6

db:VULHUBid:VHN-184149

Trust: 0.1

db:VULMONid:CVE-2020-6024

Trust: 0.1

sources: VULHUB: VHN-184149 // VULMON: CVE-2020-6024 // JVNDB: JVNDB-2020-015676 // CNNVD: CNNVD-202101-1562 // NVD: CVE-2020-6024

REFERENCES

url:https://supportcontent.checkpoint.com/solutions?id=sk142952

Trust: 1.8

url:https://nvd.nist.gov/vuln/detail/cve-2020-6024

Trust: 1.4

url:https://vigilance.fr/vulnerability/check-point-smartconsole-privilege-escalation-34398

Trust: 0.6

url:https://cwe.mitre.org/data/definitions/269.html

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

sources: VULHUB: VHN-184149 // VULMON: CVE-2020-6024 // JVNDB: JVNDB-2020-015676 // CNNVD: CNNVD-202101-1562 // NVD: CVE-2020-6024

SOURCES

db:VULHUBid:VHN-184149
db:VULMONid:CVE-2020-6024
db:JVNDBid:JVNDB-2020-015676
db:CNNVDid:CNNVD-202101-1562
db:NVDid:CVE-2020-6024

LAST UPDATE DATE

2024-11-23T21:51:03.707000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-184149date:2021-02-02T00:00:00
db:VULMONid:CVE-2020-6024date:2021-02-02T00:00:00
db:JVNDBid:JVNDB-2020-015676date:2021-10-08T09:11:00
db:CNNVDid:CNNVD-202101-1562date:2021-02-09T00:00:00
db:NVDid:CVE-2020-6024date:2024-11-21T05:35:00.187

SOURCES RELEASE DATE

db:VULHUBid:VHN-184149date:2021-01-20T00:00:00
db:VULMONid:CVE-2020-6024date:2021-01-20T00:00:00
db:JVNDBid:JVNDB-2020-015676date:2021-10-08T00:00:00
db:CNNVDid:CNNVD-202101-1562date:2021-01-20T00:00:00
db:NVDid:CVE-2020-6024date:2021-01-20T19:15:12.947