Vigil@nce: Checkpoint VPN1, administration access
December 2008 by Vigil@nce
SYNTHESIS
An attacker can use a vulnerability of the Policy Editor port in
order to obtain an administration access.
Gravity: 2/4
Consequences: administrator access/rights
Provenance: intranet client
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: unique source (2/5)
Diffusion of the vulnerable configuration: high (3/3)
Creation date: 12/12/2008
IMPACTED PRODUCTS
– CheckPoint VPN-1
DESCRIPTION
The port TCP 18190 is used by the Policy Editor or Smart Dashboard.
An attacker could connect to this port and use a vulnerability to
reset the SSH password. Technical details are unknown.
An attacker can therefore use a vulnerability of the Policy Editor
port in order to obtain an administration access.
CHARACTERISTICS
Identifiers: BID-32777, VIGILANCE-VUL-8328