Check Point Software Zonealarm

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in Check Point Software Zonealarm.

By the Year

In 2026 there have been 0 vulnerabilities in Check Point Software Zonealarm. Zonealarm did not have any published security vulnerabilities last year.

Year Vulnerabilities Average Score
2026 0 0.00
2025 0 0.00
2024 0 0.00
2023 0 0.00
2022 2 8.30
2021 0 0.00
2020 2 6.65
2019 4 7.80

It may take a day or so for new Zonealarm vulnerabilities to show up in the stats or in the list of recent security vulnerabilities. Additionally vulnerabilities may be tagged under a different product or component name.

Recent Check Point Software Zonealarm Security Vulnerabilities

Check Point ZoneAlarm Extreme Security <v15.8.211.19229 Priv Esc via Junction
CVE-2022-41604 8.8 - High - September 27, 2022

Check Point ZoneAlarm Extreme Security before 15.8.211.19229 allows local users to escalate privileges. This occurs because of weak permissions for the %PROGRAMDATA%\CheckPoint\ZoneAlarm\Data\Updates directory, and a self-protection driver bypass that allows creation of a junction directory. This can be leveraged to perform an arbitrary file move as NT AUTHORITY\SYSTEM.

Improper Privilege Management

Check Point ZoneAlarm before version 15.8.200.19118 allows a local actor to escalate privileges during the upgrade process
CVE-2022-23743 7.8 - High - May 11, 2022

Check Point ZoneAlarm before version 15.8.200.19118 allows a local actor to escalate privileges during the upgrade process. In addition, weak permissions in the ProgramData\CheckPoint\ZoneAlarm\Data\Updates directory allow a local attacker the ability to execute an arbitrary file write, leading to execution of code as local system, in ZoneAlarm versions before v15.8.211.192119

Improper Privilege Management

Check Point ZoneAlarm before version 15.8.139.18543
CVE-2020-6022 5.5 - Medium - October 27, 2020

Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to delete arbitrary files while restoring files in Anti-Ransomware.

Check Point ZoneAlarm before version 15.8.139.18543
CVE-2020-6023 7.8 - High - October 27, 2020

Check Point ZoneAlarm before version 15.8.139.18543 allows a local actor to escalate privileges while restoring files in Anti-Ransomware.

A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so
CVE-2019-8452 - April 22, 2019

A hard-link created from log file archive of Check Point ZoneAlarm up to 15.4.062 or Check Point Endpoint Security client for Windows before E80.96 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.

Windows Hard Link

Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions
CVE-2019-8453 - April 17, 2019

Some of the DLLs loaded by Check Point ZoneAlarm up to 15.4.062 are taken from directories where all users have write permissions. This can allow a local attacker to replace a DLL file with a malicious one and cause Denial of Service to the client.

Process Control

A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so
CVE-2019-8455 - April 17, 2019

A hard-link created from the log file of Check Point ZoneAlarm up to 15.4.062 to any file on the system will get its permission changed so that all users can access that linked file. Doing this on files with limited access gains the local attacker higher privileges to the file.

Windows Hard Link

Check Point ZoneAlarm version 15.3.064.17729 and below expose a WCF service
CVE-2018-8790 7.8 - High - March 01, 2019

Check Point ZoneAlarm version 15.3.064.17729 and below expose a WCF service that can allow a local low privileged user to execute arbitrary code as SYSTEM.

Stay on top of Security Vulnerabilities

Want an email whenever new vulnerabilities are published for Check Point Software Zonealarm or by Check Point Software? Click the Watch button to subscribe.

 
subscribe