First published: Sat Nov 30 2013(Updated: )
Unlock.exe in Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not associate password failures with a device ID, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by overwriting DVREM.EPM with a copy of itself after each few password guesses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security Clients | =e80 | |
Checkpoint Endpoint Security Clients | =e80.10 | |
Checkpoint Endpoint Security Clients | =e80.20 | |
Checkpoint Endpoint Security Clients | =e80.30 | |
Checkpoint Endpoint Security Clients | =e80.40 | |
Checkpoint Endpoint Security Clients | =e80.41 | |
Checkpoint Endpoint Security Clients | =e80.50 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-5636 is classified as a medium severity vulnerability.
To mitigate CVE-2013-5636, it is recommended to upgrade to a version of Check Point Endpoint Security that is not affected by this vulnerability.
CVE-2013-5636 allows physical attackers to bypass device-locking mechanisms, potentially leading to unauthorized access.
CVE-2013-5636 affects Check Point Endpoint Security versions E80, E80.10, E80.20, E80.30, E80.40, E80.41, and E80.50.
Currently, the primary recommendation for CVE-2013-5636 is to update the affected software versions to prevent exploitation.