Vigil@nce - Check Point Security Gateway: lack of enforcemetn of authentication rules
June 2020 by Vigil@nce
This bulletin was written by Vigil@nce : https://vigilance.fr/?langue=2
SYNTHESIS OF THE VULNERABILITY
An attacker can bypass restrictions of Check Point Security Gateway, in order to escalate his privileges. Impacted products: GAiA, CheckPoint IP Appliance, CheckPoint Power-1 Appliance, SecurePlatform, CheckPoint Security Appliance, CheckPoint Security Gateway.
Consequences: user access/rights.
Provenance: internet client.
Confidence: confirmed by the editor (5/5).
Creation date: 19/05/2020.
DESCRIPTION OF THE VULNERABILITY
An attacker can bypass restrictions about authentication modes for access to Check Point Security Gateway.
ACCESS TO THE FULL VIGIL@NCE BULLETIN