First published: Fri Jul 08 2011(Updated: )
Unspecified vulnerability in Check Point Multi-Domain Management / Provider-1 NGX R65, R70, R71, and R75, and SmartCenter during installation on non-Windows machines, allows local users on the MDS system to overwrite arbitrary files via unknown vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Multi-domain Management / Provider-1 | =ngx_r75 | |
Checkpoint Multi-domain Management / Provider-1 | =ngx_smartcenter | |
Checkpoint Multi-domain Management / Provider-1 | =ngx_r65 | |
Checkpoint Multi-domain Management / Provider-1 | =ngx_r71 | |
Checkpoint Multi-domain Management / Provider-1 | =ngx_r70 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2664 is classified as a high severity vulnerability due to its potential to allow local users to overwrite arbitrary files.
To mitigate CVE-2011-2664, it is recommended to apply the latest security patches provided by Check Point for the affected versions.
CVE-2011-2664 affects Check Point Multi-Domain Management / Provider-1 NGX R65, R70, R71, R75, and SmartCenter.
Exploitation of CVE-2011-2664 could lead to unauthorized modification of files by local users on the MDS system.
The exact vectors for exploitation of CVE-2011-2664 are unspecified, which may indicate varying complexity based on system configurations.