Vulnerabilities > Checkpoint
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2014-01-26 | CVE-2014-1672 | Permissions, Privileges, and Access Controls vulnerability in Checkpoint Management Server and Security Gateway Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing when the routing table is modified and the "Get - Interfaces with Topology" action is performed, which allows attackers to bypass intended access restrictions. | 4.0 |
2014-01-23 | CVE-2013-7311 | Unspecified vulnerability in Checkpoint Gaia OS and Ipso OS The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149. | 5.4 |
2014-01-22 | CVE-2013-7304 | Cryptographic Issues vulnerability in Checkpoint Endpoint Security MI Server R73 3.0.0 Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle attackers to spoof SSL servers by presenting an arbitrary certificate during a session established by a client. | 4.3 |
2013-11-30 | CVE-2013-5636 | Credentials Management vulnerability in Checkpoint Endpoint Security Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses. | 3.3 |
2013-11-30 | CVE-2013-5635 | Credentials Management vulnerability in Checkpoint Endpoint Security Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously. | 3.3 |
2012-06-19 | CVE-2012-2753 | Unspecified vulnerability in Checkpoint products Untrusted search path vulnerability in TrGUI.exe in the Endpoint Connect (aka EPC) GUI in Check Point Endpoint Security R73.x and E80.x on the VPN blade platform, Endpoint Security VPN R75, Endpoint Connect R73.x, and Remote Access Clients E75.x allows local users to gain privileges via a Trojan horse DLL in the current working directory. local checkpoint | 6.9 |
2011-10-05 | CVE-2011-1827 | Remote Code Execution vulnerability in Multiple Check Point SSL VPN On-Demand Applications Multiple unspecified vulnerabilities in Check Point SSL Network Extender (SNX), SecureWorkSpace, and Endpoint Security On-Demand, as distributed by SecurePlatform, IPSO6, Connectra, and VSX, allow remote attackers to execute arbitrary code via vectors involving a (1) ActiveX control or (2) Java applet. | 9.3 |
2011-07-08 | CVE-2011-2664 | Local Security vulnerability in Check Point Provider-1 Unspecified vulnerability in Check Point Multi-Domain Management / Provider-1 NGX R65, R70, R71, and R75, and SmartCenter during installation on non-Windows machines, allows local users on the MDS system to overwrite arbitrary files via unknown vectors. | 3.6 |
2009-08-21 | CVE-2008-7025 | Remote Denial of Service vulnerability in Checkpoint Zonealarm 8.0.020.000 TrueVector in Check Point ZoneAlarm 8.0.020.000, with vsmon.exe running, allows remote HTTP proxies to cause a denial of service (crash) and disable the HIDS module via a crafted response. network checkpoint | 4.3 |
2009-08-19 | CVE-2008-7009 | Buffer Errors vulnerability in Checkpoint Zonealarm 7.0.483.000/8.0.020.000 Buffer overflow in multiscan.exe in Check Point ZoneAlarm Security Suite 7.0.483.000 and 8.0.020.000 allows local users to execute arbitrary code via a file or directory with a long path. | 6.9 |