First published: Wed Jan 22 2014(Updated: )
Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle attackers to spoof SSL servers by presenting an arbitrary certificate during a session established by a client.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Endpoint Security Server | <=3.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-7304 is considered a high severity vulnerability due to the potential for man-in-the-middle attacks.
To mitigate CVE-2013-7304, ensure that proper X.509 certificate validation is configured in the Check Point Endpoint Security MI Server.
CVE-2013-7304 allows attackers to spoof SSL servers, potentially leading to data interception and unauthorized access.
CVE-2013-7304 affects Check Point Endpoint Security MI Server R73 versions up to and including 3.0.0 HFA2.5.
Users should check with Check Point for any available patches or updates that address CVE-2013-7304.