Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Checkpoint SecuRemote information leakage
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
The remote host seems to be a Checkpoint FireWall-1 running SecuRemote. The SecuRemote service contains a vulnerability that allows attackers to gain information about the hosts, networks, and users configured on the Firewall.
Solution
Solution
Either block the SecuRemote's ports (TCP 256 and 264) to untrusted networks, or upgrade to the latest version of Checkpoint's Firewall-1. Workaround: You could restrict the topology download, so that only authenticated users can download it. Go to Policy Properties Desktop Security of your Policy Editor and uncheck 'respond to unauthenticated topology requests'. After installing the Policy only authenticated Users can download the Topology.