First published: Thu Sep 24 2020(Updated: )
Check Point Security Management's Internal CA web management before Jumbo HFAs R80.10 Take 278, R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38, can be manipulated to run commands as a high privileged user or crash, due to weak input validation on inputs by a trusted management administrator.
Credit: cve@checkpoint.com
Affected Software | Affected Version | How to fix |
---|---|---|
Checkpoint Ica Management Portal | <r80.20 | |
Checkpoint Ica Management Portal | =r80.20 | |
Checkpoint Ica Management Portal | =r80.20-take_156 | |
Checkpoint Ica Management Portal | <r80.30 | |
Checkpoint Ica Management Portal | =r80.30 | |
Checkpoint Ica Management Portal | =r80.30-take_200 | |
Checkpoint Ica Management Portal | <r80.40 | |
Checkpoint Ica Management Portal | =r80.40 | |
Checkpoint Ica Management Portal | <r80.10 | |
Checkpoint Ica Management Portal | =r80.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-6020 is a vulnerability in Check Point Security Management's Internal CA web management before Jumbo HFAs R80.10 Take 278, R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38.
CVE-2020-6020 has a severity level of high.
The Check Point Security Management's Internal CA web management versions before Jumbo HFAs R80.10 Take 278, R80.20 Take 160, R80.30 Take 210, and R80.40 Take 38 are affected by CVE-2020-6020.
CVE-2020-6020 can be exploited by manipulating the Check Point Security Management's Internal CA web management to run commands as a high privileged user or crash it due to weak input validation.
Yes, it is recommended to apply the recommended Jumbo Hotfix Accumulator (HFA) for the affected Check Point Security Management's Internal CA web management versions.