The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.

computer vulnerability announce CVE-2008-0662

VPN-1 SecuRemote/SecureClient: cached authentication

Synthesis of the vulnerability

Authentication data stored by VPN-1 SecuRemote/SecureClient can be read from the registry.
Impacted products: CheckPoint SecureClient, CheckPoint SecuRemote, VPN-1.
Severity of this bulletin: 2/4.
Consequences of an intrusion: user access/rights.
Hacker's origin: physical access.
Creation date: 07/02/2008.
Références of this threat: BID-27675, CVE-2008-0662, sk34315, VIGILANCE-VUL-7557.

Description of the vulnerability

Users of VPN-1 SecuRemote/SecureClient can enable the Auto Local Logon option, which stores authentication credentials in the registry.

However, access permissions to the registry key are "Full control" for "Everyone". All local users can thus read the key.

An attacker, with an access victim's registry, can therefore use his authentication credentials to access to the VPN.
Full Vigil@nce bulletin... (Free trial)

Computer vulnerabilities tracking service

Vigil@nce provides networks vulnerabilities bulletins. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce computer vulnerability tracking service alerts your teams of vulnerabilities or threats impacting your information system. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications.