|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
VPN-1 SecuRemote/SecureClient: cached authentication
Synthesis of the vulnerability
Authentication data stored by VPN-1 SecuRemote/SecureClient can be read from the registry.
Impacted products: CheckPoint SecureClient, CheckPoint SecuRemote, VPN-1.
Severity of this bulletin: 2/4.
Consequences of an intrusion: user access/rights.
Hacker's origin: physical access.
Creation date: 07/02/2008.
Références of this threat: BID-27675, CVE-2008-0662, sk34315, VIGILANCE-VUL-7557.
Description of the vulnerability
Users of VPN-1 SecuRemote/SecureClient can enable the Auto Local Logon option, which stores authentication credentials in the registry.
However, access permissions to the registry key are "Full control" for "Everyone". All local users can thus read the key.
An attacker, with an access victim's registry, can therefore use his authentication credentials to access to the VPN.
Full Vigil@nce bulletin... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides networks vulnerabilities bulletins. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.