First published: Tue Apr 09 2019(Updated: )
Check Point IKEv2 IPsec VPN up to R80.30, in some less common conditions, may allow an attacker with knowledge of the internal configuration and setup to successfully connect to a site-to-site VPN server.
Credit: cve@checkpoint.com cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Ipsec Vpn | =r80.10 | |
Checkpoint Ipsec Vpn | =r80.20 | |
=r80.10 | ||
=r80.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-8456 is a vulnerability that affects Check Point IKEv2 IPsec VPN up to R80.30, allowing an attacker with knowledge of the internal configuration and setup to successfully connect to a site-to-site VPN server.
The severity of CVE-2019-8456 is considered medium with a severity value of 5.9.
CVE-2019-8456 affects Check Point IKEv2 IPsec VPN versions up to R80.30, including r80.10 and r80.20.
An attacker with knowledge of the internal configuration and setup can exploit CVE-2019-8456 by successfully connecting to a site-to-site VPN server.
Yes, Check Point has provided a solution for CVE-2019-8456. Please refer to the following link for details: https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk149892