First published: Thu Dec 08 2005(Updated: )
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point SecureClient NG | =r56 | |
Check Point VPN-1 SecureClient | =4.1 | |
Check Point SecureClient NG | ||
Check Point VPN-1 SecureClient | =4.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-4093 is considered to have a high severity as it allows remote attackers to bypass security policies.
To fix CVE-2005-4093, ensure that you are using the latest version of Check Point VPN-1 SecureClient or SecureClient NG with updated policy configurations.
CVE-2005-4093 affects Check Point VPN-1 SecureClient NG R56, NG FP1, 4.0, and 4.1 versions.
Yes, CVE-2005-4093 can be exploited remotely by attackers who modify the local copy of the policy file.
The impact of CVE-2005-4093 on network security is significant, as it allows attackers to bypass critical security policies.