Check Point Harmony SASE Windows Client Vulnerability Enables Privilege Escalation

Related

Female Cybersecurity Leaders to Watch in Maine

Maine’s cybersecurity leadership bench reflects a mix of operational...

Female Cybersecurity Leaders to Watch in Iowa

Iowa’s cybersecurity leadership reflects a blend of enterprise security,...

Female Cybersecurity Leaders to Watch in New Hampshire

New Hampshire’s cybersecurity leadership stands out for its mix...

Critical NVIDIA Vulnerabilities Enable RCE and DoS Attacks

What happened Critical NVIDIA vulnerabilities enable remote code execution and...

BIND Updates Patch High-Severity Vulnerabilities

What happened New BIND updates patch high-severity vulnerabilities that could...

Share

What happened

A privilege-escalation vulnerability in the Check Point Harmony SASE Windows client affecting versions prior to 12.2 allows a local attacker to escalate privileges by writing or deleting files outside the intended certificate working directory. Tracked as CVE-2025-9142, the flaw exists in the Perimeter81.Service.exe component, which runs with SYSTEM privileges, and stems from insufficient validation of JWT (JSON Web Token) values during authentication. When a user initiates the login flow through a URI handler, a specially crafted perimeter81:// URL with a tampered JWT containing directory traversal sequences can lead to undesired file writes or deletions. The issue was publicly disclosed on January 14, 2026, and Check Point released a fix in version 12.2 on November 18, 2025. 

Who is affected

Organizations and users running Check Point Harmony SASE Windows client versions earlier than 12.2 are directly affected by this privilege-escalation vulnerability. The impact is limited to local attackers with access to the affected endpoint, and exploitation could result in unauthorized system-level actions. 

Why CISOs should care

This issue demonstrates a flaw in the authentication and token handling logic of a widely used secure access client, where improper JWT validation can allow local attackers to gain elevated privileges on Windows systems. Identifying and remediating such vulnerabilities is relevant to maintaining the integrity of endpoint security posture, especially where SASE clients operate with high privileges. 

3 practical actions

Apply vendor update. Upgrade all Harmony SASE Windows clients to version 12.2 or later to remediate CVE-2025-9142. 

Restrict local access. Limit local user access to systems running the vulnerable client to reduce the potential for local privilege escalation. 

Verify client versions. Audit enterprise endpoints to identify any Harmony SASE Windows client installations below version 12.2 and prioritize their patching.Â