First published: Sun Nov 16 2014(Updated: )
Multiple unspecified vulnerabilities in Check Point Security Gateway R75.40VS, R75.45, R75.46, R75.47, R76, R77, and R77.10, when the (1) IPS blade, (2) IPsec Remote Access, (3) Mobile Access / SSL VPN blade, (4) SSL Network Extender, (5) Identify Awareness blade, (6) HTTPS Inspection, (7) UserCheck, or (8) Data Leak Prevention blade module is enabled, allow remote attackers to cause a denial of service ("stability issue") via an unspecified "traffic condition."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Check Point Security Gateway | =r75.40-vs | |
Check Point Security Gateway | =r75.45 | |
Check Point Security Gateway | =r75.46 | |
Check Point Security Gateway | =r75.47 | |
Check Point Security Gateway | =r76 | |
Check Point Security Gateway | =r77 | |
Check Point Security Gateway | =r77.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-8952 has a moderate severity rating due to multiple unspecified vulnerabilities affecting various Check Point Security Gateway versions.
To mitigate CVE-2014-8952, upgrade to the latest patched version of Check Point Security Gateway that addresses these vulnerabilities.
CVE-2014-8952 affects Check Point Security Gateway versions R75.40VS, R75.45, R75.46, R75.47, R76, R77, and R77.10.
CVE-2014-8952 impacts multiple components including the IPS blade, IPsec Remote Access, and SSL VPN blade among others.
Currently, there is no known workaround for CVE-2014-8952, and the recommended action is to apply the available updates.