First published: Sat Nov 30 2013(Updated: )
Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security Clients | =e80 | |
Checkpoint Endpoint Security Clients | =e80.10 | |
Checkpoint Endpoint Security Clients | =e80.20 | |
Checkpoint Endpoint Security Clients | =e80.30 | |
Checkpoint Endpoint Security Clients | =e80.40 | |
Checkpoint Endpoint Security Clients | =e80.41 | |
Checkpoint Endpoint Security Clients | =e80.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5635 has a moderate severity level due to its potential to allow unauthorized access through password bypass.
To fix CVE-2013-5635, upgrading to a later version of Check Point Endpoint Security beyond E80.50 is recommended.
CVE-2013-5635 requires physical access to the device for an attacker to exploit the vulnerability.
Affected versions of Check Point Endpoint Security include E80 through E80.50.
CVE-2013-5635 can facilitate brute-force attacks on the device-locking mechanism.