Check Point Vulnerability Allowed Hackers to Escalate Privileges and Run Code