First published: Tue Dec 31 2002(Updated: )
Check Point FireWall-1 4.1 and Next Generation (NG), with UserAuth configured to proxy HTTP traffic only, allows remote attackers to pass unauthorized HTTPS, FTP and possibly other traffic through the firewall.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point FireWall-1 | =4.1 | |
Check Point FireWall-1 | =ng |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2405 is considered to be a medium severity vulnerability due to its ability to allow unauthorized traffic through the firewall.
To fix CVE-2002-2405, ensure that UserAuth is configured properly to restrict HTTP traffic only and review firewall rules.
CVE-2002-2405 affects Check Point FireWall-1 version 4.1 and the Next Generation (NG) version.
Yes, CVE-2002-2405 can allow unauthorized FTP traffic through the firewall due to misconfiguration.
Remote attackers can exploit CVE-2002-2405 if the firewall is not correctly configured to block unauthorized traffic.