Zero-friction vulnerability management platform

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Checkpoint SecuRemote information leakage

Information

Severity

Severity

Medium

Family

Family

Firewalls

CVSSv2 Base

CVSSv2 Base

5.0

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:L/Au:N/C:P/I:N/A:N

Solution Type

Solution Type

Vendor Patch

Created

Created

16 years ago

Modified

Modified

3 years ago

Summary

The remote host seems to be a Checkpoint FireWall-1 running SecuRemote. The SecuRemote service contains a vulnerability that allows attackers to gain information about the hosts, networks, and users configured on the Firewall.

Solution

Solution

Either block the SecuRemote's ports (TCP 256 and 264) to untrusted networks, or upgrade to the latest version of Checkpoint's Firewall-1. Workaround: You could restrict the topology download, so that only authenticated users can download it. Go to Policy Properties Desktop Security of your Policy Editor and uncheck 'respond to unauthenticated topology requests'. After installing the Policy only authenticated Users can download the Topology.

Common Vulnerabilities and Exposures (CVE)