First published: Tue Jun 11 2002(Updated: )
Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point VPN | =1_4.1 | |
Check Point VPN | =1_4.1_sp1 | |
Check Point VPN | =1_4.1_sp2 | |
Check Point VPN | =1_4.1_sp3 | |
Check Point VPN | =1_4.1_sp4 | |
Check Point FireWall-1 | =4.0 | |
Check Point FireWall-1 | =4.0-sp1 | |
Check Point FireWall-1 | =4.0-sp2 | |
Check Point FireWall-1 | =4.0-sp3 | |
Check Point FireWall-1 | =4.0-sp4 | |
Check Point FireWall-1 | =4.0-sp5 | |
Check Point FireWall-1 | =4.0-sp6 | |
Check Point FireWall-1 | =4.0-sp7 | |
Check Point FireWall-1 | =4.0-sp8 | |
Check Point FireWall-1 | =4.1 | |
Check Point FireWall-1 | =4.1-sp1 | |
Check Point FireWall-1 | =4.1-sp2 | |
Check Point FireWall-1 | =4.1-sp3 | |
Check Point FireWall-1 | =4.1-sp4 | |
Check Point FireWall-1 | =4.1-sp5 | |
Check Point Next Generation |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0428 is considered to have a moderate severity level as it allows unauthorized access potentially impacting security.
To fix CVE-2002-0428, update to the latest version of Check Point FireWall-1 or SecuRemote/SecuClient that addresses this vulnerability.
CVE-2002-0428 affects versions 4.0 and 4.1 of Check Point FireWall-1 and SecuRemote/SecuClient.
Exploiting CVE-2002-0428 could allow an attacker to bypass authentication mechanisms, leading to unauthorized access.
Yes, the vulnerability involves modifying the users.C configuration file to bypass the authentication timeout.