The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Vulnerability of Check Point Security Gateway: lack of enforcemetn of authentication rules

Synthesis of the vulnerability 

An attacker can bypass restrictions of Check Point Security Gateway, in order to escalate his privileges.
Impacted systems: GAiA, CheckPoint IP Appliance, CheckPoint Power-1 Appliance, SecurePlatform, CheckPoint Security Appliance, CheckPoint Security Gateway.
Severity of this alert: 1/4.
Creation date: 19/05/2020.
Références of this alert: sk166912, VIGILANCE-VUL-32297.

Description of the vulnerability 

An attacker can bypass restrictions about authentication modes for access to Check Point Security Gateway.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

This computer vulnerability bulletin impacts software or systems such as GAiA, CheckPoint IP Appliance, CheckPoint Power-1 Appliance, SecurePlatform, CheckPoint Security Appliance, CheckPoint Security Gateway.

Our Vigil@nce team determined that the severity of this vulnerability bulletin is low.

The trust level is of type confirmed by the editor, with an origin of internet client.

An attacker with a expert ability can exploit this threat note.

Solutions for this threat 

Check Point Security Gateway: solution for missing authentication.
To obtain the solution, the editor has to be contacted.
Full bulletin, software filtering, emails, fixes, ... (Request your free trial)

Computer vulnerabilities tracking service 

Vigil@nce provides a computers vulnerabilities announce. The Vigil@nce vulnerability database contains several thousand vulnerabilities.