First published: Thu Mar 20 2008(Updated: )
Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point VPN-1 Pro | =ngx_r61 | |
Check Point VPN-1 Pro | =ngx_r62_ga | |
Check Point VPN-1 | =ngx_r60 | |
Check Point VPN-1 Firewall-1 | =ng_ai_r55 | |
Check Point VPN-1 Power UTM | =ngx_r65_with_messaging_security | |
Check Point VPN-1 Power UTM | =r65 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-1397 has a medium severity rating as it can lead to denial of service and potential interception of network traffic.
To fix CVE-2008-1397, ensure that local RFC1918 IP addresses are properly configured and do not match those used in site-to-site VPN tunnels.
CVE-2008-1397 affects Check Point VPN-1 Power/UTM versions NGX R60 through R65 and NG AI R55.
Yes, CVE-2008-1397 can be exploited by remote authenticated users, allowing them to cause a denial of service.
CVE-2008-1397 poses a risk of denial of service for VPN tunnels and may allow interception of sensitive network traffic.