
16/11/2014

6/8/2024
CVE-2014-8951
First published: Sun Nov 16 2014(Updated: )
Unspecified vulnerability in Check Point Security Gateway R75, R76, R77, and R77.10, when UserCheck is enabled and the (1) Application Control, (2) URL Filtering, (3) DLP, (4) Threat Emulation, (5) Anti-Bot, or (6) Anti-Virus blade is used, allows remote attackers to cause a denial of service (fwk0 process crash, core dump, and restart) via a redirect to the UserCheck page.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|
Check Point Security Gateway | =r75 | |
Check Point Security Gateway | =r76 | |
Check Point Security Gateway | =r77 | |
Check Point Security Gateway | =r77.10 | |
Never miss a vulnerability like this again
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
Frequently Asked Questions
What is the severity of CVE-2014-8951?
CVE-2014-8951 has not been assigned a specific severity rating, but it causes a denial of service in affected systems.
How do I fix CVE-2014-8951?
To mitigate CVE-2014-8951, it is recommended to upgrade to the latest version of Check Point Security Gateway that addresses this vulnerability.
Which versions of Check Point Security Gateway are affected by CVE-2014-8951?
CVE-2014-8951 affects the R75, R76, R77, and R77.10 versions of Check Point Security Gateway.
What kind of attack can be executed using CVE-2014-8951?
CVE-2014-8951 allows remote attackers to execute denial of service attacks on the affected Check Point Security Gateway configurations.
Is UserCheck related to CVE-2014-8951?
Yes, CVE-2014-8951 occurs when UserCheck is enabled along with specific security features like Application Control and URL Filtering.
- agent/references
- agent/type
- agent/softwarecombine
- collector/mitre-cve
- source/MITRE
- agent/last-modified-date
- agent/author
- agent/severity
- agent/description
- agent/first-publish-date
- agent/event
- agent/source
- agent/tags
- collector/nvd-index
- agent/software-canonical-lookup-request
- vendor/checkpoint
- canonical/check point security gateway
- version/check point security gateway/r75
- version/check point security gateway/r76
- version/check point security gateway/r77
- version/check point security gateway/r77.10
Contact
SecAlerts Pty Ltd.
132 Wickham Terrace
Fortitude Valley,
QLD 4006, Australia
info@secalerts.coBy using SecAlerts services, you agree to our services end-user license agreement. This website is safeguarded by reCAPTCHA and governed by the Google Privacy Policy and Terms of Service. All names, logos, and brands of products are owned by their respective owners, and any usage of these names, logos, and brands for identification purposes only does not imply endorsement. If you possess any content that requires removal, please get in touch with us.
© 2025 SecAlerts Pty Ltd.
ABN: 70 645 966 203, ACN: 645 966 203