Check Point Software Identity Agent

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Check Point Software Identity Agent.

By the Year

In 2026 there have been 0 vulnerabilities in Check Point Software Identity Agent. Last year, in 2025 Identity Agent had 1 security vulnerability published. Right now, Identity Agent is on track to have less security vulnerabilities in 2026 than it did last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 1 6.50
2024 1 7.30
2023 0 0.00
2022 0 0.00
2021 1 8.10

It may take a day or so for new Identity Agent vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Check Point Software Identity Agent Security Vulnerabilities

Local User Can Abuse Check Point Identity Agent Registry for Policy Exposure
CVE-2025-8304 6.5 - Medium - December 22, 2025

An authenticated local user can obtain information that allows claiming security policy rules of another user due to sensitive information being accessible in the Windows Registry keys for Check Point Identity Agent running on a Terminal Server.

Information Disclosure

Check Point ZAE NextGen LPE on Windows
CVE-2024-24910 7.3 - High - April 18, 2024

A local attacker can erscalate privileges on affected Check Point ZoneAlarm ExtremeSecurity NextGen, Identity Agent for Windows, and Identity Agent for Windows Terminal Server. To exploit this vulnerability, an attacker must first obtain the ability to execute local privileged code on the target system.

Incorrect Permission Assignment for Critical Resource

A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could
CVE-2021-30356 8.1 - High - April 22, 2021

A denial of service vulnerability was reported in Check Point Identity Agent before R81.018.0000, which could allow low privileged users to overwrite protected system files.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Check Point Software Identity Agent or by Check Point Software? Click the Watch button to subscribe.

 
subscribe