|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Check Point: vulnerabilities of IPMI
Synthesis of the vulnerability
An attacker can use IPMI vulnerabilities in several Check Point products, in order to perform management operations on the hardware.
Impacted software: GAiA, CheckPoint IP Appliance, CheckPoint Power-1 Appliance, SecurePlatform, CheckPoint Security Appliance, CheckPoint Smart-1, CheckPoint UTM-1 Appliance.
Severity of this computer vulnerability: 2/4.
Consequences of a hack: administrator access/rights, privileged access/rights.
Attacker's origin: intranet client.
Creation date: 13/08/2013.
Références of this announce: sk94228, VIGILANCE-VUL-13270.
Description of the vulnerability
The IPMI (Intelligent Platform Management Interface) protocol is used to manage the hardware.
Several vulnerabilities were announced in IPMI (VIGILANCE-VUL-13267, VIGILANCE-VUL-13268 and VIGILANCE-VUL-13269). Some of these vulnerabilities impact the hardware of Check Point products.
An attacker can therefore use IPMI vulnerabilities in several Check Point products, in order to perform management operations on the hardware.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides an applications vulnerabilities management. The Vigil@nce vulnerability database contains several thousand vulnerabilities. The technology watch team tracks security threats targeting the computer system. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system.