Checkpoint Security Gateway vulnerabilities

8 known vulnerabilities affecting checkpoint/security_gateway.

Total CVEs
8
CISA KEV
2
actively exploited
Public exploits
2
Exploited in wild
2
Severity breakdown
CRITICAL3HIGH4MEDIUM1

Vulnerabilities

Page 1 of 1
CVE-2019-8462HIGHCVSS 7.5vr80.302019-10-02
CVE-2019-8462 [HIGH] CWE-755 CVE-2019-8462: In a rare scenario, Check Point R80.30 Security Gateway before JHF Take 50 managed by Check Point R8 In a rare scenario, Check Point R80.30 Security Gateway before JHF Take 50 managed by Check Point R80.30 Management crashes with a unique configuration of enhanced logging.
nvd
CVE-2014-8950HIGHCVSS 7.1vr77vr77.102014-11-16
CVE-2014-8950 [HIGH] CVE-2014-8950: Unspecified vulnerability in Check Point Security Gateway R77 and R77.10, when the (1) URL Filtering Unspecified vulnerability in Check Point Security Gateway R77 and R77.10, when the (1) URL Filtering or (2) Identity Awareness blade is used, allows remote attackers to cause a denial of service (crash) via vectors involving an HTTPS request.
nvd
CVE-2014-8951HIGHCVSS 7.1vr75vr76+2 more2014-11-16
CVE-2014-8951 [HIGH] CVE-2014-8951: Unspecified vulnerability in Check Point Security Gateway R75, R76, R77, and R77.10, when UserCheck Unspecified vulnerability in Check Point Security Gateway R75, R76, R77, and R77.10, when UserCheck is enabled and the (1) Application Control, (2) URL Filtering, (3) DLP, (4) Threat Emulation, (5) Anti-Bot, or (6) Anti-Virus blade is used, allows remote attackers to cause a denial of service (fwk0 process crash, core dump, and restart) via a redirect to the Use
nvd
CVE-2014-8952HIGHCVSS 7.1vr75.40vr75.45+5 more2014-11-16
CVE-2014-8952 [HIGH] CVE-2014-8952: Multiple unspecified vulnerabilities in Check Point Security Gateway R75.40VS, R75.45, R75.46, R75.4 Multiple unspecified vulnerabilities in Check Point Security Gateway R75.40VS, R75.45, R75.46, R75.47, R76, R77, and R77.10, when the (1) IPS blade, (2) IPsec Remote Access, (3) Mobile Access / SSL VPN blade, (4) SSL Network Extender, (5) Identify Awareness blade, (6) HTTPS Inspection, (7) UserCheck, or (8) Data Leak Prevention blade module is enabled, allow re
nvd
CVE-2014-7169CRITICALCVSS 9.8KEVPoCfixed in r77.302014-09-25
CVE-2014-7169 [CRITICAL] CVE-2014-7169: GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definiti GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgi
nvd
CVE-2014-6271CRITICALCVSS 9.8KEVPoCfixed in r77.302014-09-24
CVE-2014-6271 [CRITICAL] CWE-78 CVE-2014-6271: GNU Bash through 4.3 processes trailing strings after function definitions in the values of environm GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts execute
nvd
CVE-2013-7350CRITICALCVSS 10.0vr71.00vr71.45+1 more2014-04-01
CVE-2013-7350 [CRITICAL] CVE-2013-7350: Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (7301591 Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to "important security fixes."
nvd
CVE-2014-1672MEDIUMCVSS 4.0vr75.472014-01-26
CVE-2014-1672 [MEDIUM] CWE-264 CVE-2014-1672: Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing wh Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing when the routing table is modified and the "Get - Interfaces with Topology" action is performed, which allows attackers to bypass intended access restrictions.
nvd