A critical privilege-escalation vulnerability has been discovered in Check Point’s Harmony SASE (Secure Access Service Edge) Windows client software,

TuxTalk

Level 21
Thread author
Verified
Top Poster
Well-known
Nov 9, 2022
989
4,443
1,969
1769625100673.png


A critical privilege-escalation vulnerability has been discovered in Check Point’s Harmony SASE (Secure Access Service Edge) Windows client software, affecting versions prior to 12.2.

Tracked as CVE-2025-9142, the flaw allows local attackers to write or delete files outside the intended certificate working directory, potentially leading to system-level compromise.

The vulnerability exists within the Service component of Perimeter81 software (Perimeter81.Service.exe), which operates with SYSTEM privileges.

The flaw stems from insufficient validation of JWT (JSON Web Token) values during authentication.

CVE ID Product Affected Versions Severity
CVE-2025-9142 Harmony SASE Windows Client Below 12.2 Medium
 
The attack leverages the Perimeter81.Service.exe component, which executes with SYSTEM privileges.

MITRE ATT&CK Mapping

T1068

Exploitation for Privilege Escalation.

T1574.002
Hijack Execution Flow: DLL Side-Loading.

T1202
Indirect Command Execution.

The Vulnerability Chain

Authentication Bypass:
The client handles perimeter81:// URI schemes. An attacker crafts a URL with a tampered JWT that includes directory traversal sequences (../../../) in the tenant ID field. Because the service fails to verify the JWT signature, it processes the rogue token.

Symlink Injection
The attacker uses a rogue domain (e.g., p81-falcon.com) to pass whitelist checks. When the GenerateAndLoadCertificates() function triggers, it writes data to an attacker-controlled directory. By creating Windows Object Manager symbolic links, the attacker redirects these writes to arbitrary locations like C:\Windows\System32.

Execution
The attacker overwrites a system file or places a malicious DLL in a directory where the service attempts to load missing dependencies. Upon service restart, the malicious code executes as SYSTEM.

Remediation - THE ENTERPRISE TRACK

Blast Radius & Containment
Inventory all Windows endpoints running Harmony SASE/Perimeter81 clients below v12.2.

Revoke any local administrative rights that could facilitate the initial setup of symlinks.

TTP & Forensic Indicators

Registry/File Activity

Monitor for creation of symbolic links or junctions targeting C:\Windows\System32 originating from user-writable space.

Domain Alerts
Flag any DNS requests to p81-falcon.com or similar unregistered domains identified in the Amberwolf research.

Detection Engineering

SIEM/KQL Hunting

Query for Perimeter81.Service.exe loading unsigned DLLs or DLLs from non-standard directories.

D3FEND Mapping
Implement "Process Spawn Analysis" and "File Integrity Monitoring" on the Perimeter81 working directory.

Governance
This vulnerability meets criteria for mandatory reporting if exploitation is detected under CISA/CIRCIA guidelines due to the potential for full system compromise on critical infrastructure endpoints.

Remediation - THE HOME USER TRACK

Safety
Update the Harmony SASE/Perimeter81 client to version 12.2 or higher immediately. Do not wait for a scheduled maintenance window.

Identity
Ensure that standard user accounts are used for daily tasks instead of accounts with administrator privileges, as this complicates the initial stages of the exploit.

Persistence
After updating, perform a full system scan with a reputable antivirus provider to ensure no malicious DLLs were successfully "dropped" during a previous potential exploitation window.

Hardening & References


CIS Benchmark
Follow "Least Privilege" (L1) controls to ensure local users cannot manipulate system-level directories.

NIST SP 800-207
Apply Zero Trust principles to local IPC (Inter-Process Communication) calls, ensuring all tokens are signed and verified regardless of origin.

Authoritative Links

Check Point Support (sk184557)

Amberwolf Advisory (CVE-2025-9142)