Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons

Social Media

Hackers News Hackers News
  • CyberSecurity News
  • Threats
  • Attacks
  • Vulnerabilities
  • Breaches
  • Comparisons
Search the Site
Popular Searches:
technology Amazon AI
Recent Posts
Critical Android Zero-Click Flaw Grants Remote Shell Access
May 5, 2026
pnpm 11 Turns On Minimum Release Age by Default to Reduce npm
May 5, 2026
Microsoft Edge Vulnerability: Passwords in Cleartext Memory
May 5, 2026
Home/CyberSecurity News/Check Point Harmony SASE Windows Flaw Allows Client Vulnerability
CyberSecurity News

Check Point Harmony SASE Windows Flaw Allows Client Vulnerability

A critical privilege-escalation vulnerability has been identified in Check Point’s Harmony SASE (Secure Access Service Edge) Windows client software, impacting versions prior to 12.2. Tracked...

Marcus Rodriguez
Marcus Rodriguez
January 28, 2026 3 Min Read
0 0

A critical privilege-escalation vulnerability has been identified in Check Point’s Harmony SASE (Secure Access Service Edge) Windows client software, impacting versions prior to 12.2.

Tracked as CVE-2025-9142, the flaw allows local attackers to write or delete files outside the intended certificate working directory, potentially leading to system-level compromise.

The vulnerability exists within the Service component of Perimeter81 software (Perimeter81.Service.exe), which operates with SYSTEM privileges.

The flaw stems from insufficient validation of JWT (JSON Web Token) values during authentication.

CVE ID Product Affected Versions Severity
CVE-2025-9142 Harmony SASE Windows Client Below 12.2 Medium

When users initiate the Perimeter81 login flow through a URI handler, the JWT token is passed to the service via an IPC call, but is processed without proper signature verification.

A malicious actor can craft a specially designed perimeter81:// URL with a tampered JWT containing directory traversal sequences (../../../) in the tenant ID field.

This bypasses authentication controls and reaches the local service component, which fails to validate the token before processing it.

Technical Attack Chain

The exploitation chain unfolds in two distinct phases. First, the attacker registers a rogue authentication domain; notably, p81-falcon.com was available for registration at the time of discovery.

This domain passes the client’s whitelist validation. The JWT manipulation enables directory traversal, allowing the adversary to force the Perimeter81 service to create folder structures outside the intended location.

The second phase leverages symbolic link injection. When the GenerateAndLoadCertificates() function executes, it writes client certificates to the attacker-controlled working directory with SYSTEM privileges.

By exploiting Windows Object Manager and RPC Control directory symlinks, an attacker can redirect certificate writes to arbitrary system locations such as C:WindowsSystem32.

Symlink Attack(source : amberwolf )
Symlink Attack(source : amberwolf)

Exploitation Impact

This primitive enables attackers to overwrite critical system files or inject malicious DLLs. Process monitoring revealed the service attempting to load missing DLLs from its working directory.

Procmon Trace shows the output of Missing DLLs(source : amberwolf )
Procmon Trace shows the output of Missing DLLs (source: amberwolf)

By placing a malicious DLL at these expected locations, attackers can execute code when the Perimeter81 service restarts, thereby escalating to SYSTEM-level access.

The vulnerability is further amplified by the fact that the service’s file-handling logic fails to enforce strict trust boundaries between user input and privileged operations.

Check Point was notified of the vulnerability on March 16, 2025, and released a fix in version 12.2 on November 18, 2025. The CVE was publicly disclosed on January 14, 2026.

Organizations using Harmony SASE must immediately upgrade to version 12.2 or later to mitigate the risk of local privilege escalation attacks.

Organizations should immediately deploy Harmony SASE agent version 12.2 or later, according to Amberwolf advisory.

Additionally, restrict local administrative access and implement application whitelisting to prevent unauthorized DLL injection attacks.

Disclaimer: HackersRadar reports on cybersecurity threats and incidents for informational and awareness purposes only. We do not engage in hacking activities, data exfiltration, or the hosting or distribution of stolen or leaked information. All content is based on publicly available sources.

Tags:

AttackCVEExploitVulnerability

Share Article

Marcus Rodriguez

Marcus Rodriguez

Marcus is a security researcher and investigative journalist with expertise in vulnerability research, bug bounties, and cloud security. Since 2017, Marcus has been breaking stories on critical vulnerabilities affecting major platforms. His investigative work has led to the disclosure of numerous security flaws and improved defenses across the industry. Marcus is an active participant in bug bounty programs and has been recognized for responsible disclosure practices. He holds multiple security certifications and regularly speaks at industry events.

Previous Post

SoundCloud Data Breach Exposes 29. Million Personal

Next Post

ZAP JavaScript Engine Memory Leak Impacts Active Scan Usage

No Comment! Be the first one.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Popular Posts
Bluekit Phishing Kit Automates 2FA Lures Domains Session
May 4, 2026
New MicroStealer Malware Actively Targets Telecom Attacking Education
May 4, 2026
Malicious Tanstack Package Steals Developer Environment Files
May 4, 2026
Top Authors
Marcus Rodriguez
Marcus Rodriguez
Sarah simpson
Sarah simpson
Emy Elsamnoudy
Emy Elsamnoudy
Let's Connect
156k
2.25m
285k

Related Posts

Jennifer sherman
By Jennifer sherman
Threats

GlassWorm Attacks macOS via Malicious VS Code…

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Attacks

ClickFix Attack Hides Malicious Code via Stegan Security

January 1, 2026
Sarah simpson
By Sarah simpson
Vulnerabilities

MongoBleed Detector Tool Detects Critical MongoDB CVE-

January 1, 2026
Emy Elsamnoudy
By Emy Elsamnoudy
Breaches

Conti Ransomware Gang Leaders & Infrastructure Exposed

January 1, 2026
Hackers News Hackers News
  • [email protected]

Quick Links

  • Contact Us
  • Privacy Policy
  • Terms of service

Categories

Attacks
Breaches
Comparisons
CyberSecurity News
Threats
Vulnerabilities

Let's keep in touch

receive fresh updates and breaking cyber news every day and week!

All Rights Reserved by HackersRadar ©2026

Follow Us