Check Point Software patched a vulnerability discovered in its Endpoint Security Initial Client software for Windows. The privilege escalation security flaw tracked as CVE-2019-8461 makes it possible for attackers to run malicious payloads using system-level privileges as well as evade anti-malware detection. The vulnerability is induced by the lack of safe DLL loading caused by the use of an uncontrolled search path and by not validating if the DLLs it loads is signed with a digital certificate as researcher Peleg Hadar details.
Source: https://www.bleepingcomputer.com/news/security/check-point-patches-privilege-escalation-flaw-in-endpoint-client/

