CVE-2024-39340
https://notcve.org/view.php?id=CVE-2024-39340
12 Jul 2024 — A security vulnerability has been discovered in the handling of OTP keys in the authentication system of Securepoint UTM. This vulnerability allows the bypassing of second-factor verification (when OTP is enabled) in both the administration web interface and the user portal. Affected versions include UTM 11.5 to 12.6.4 and the Reseller Preview version 12.7.0. The issue has been fixed in UTM versions 12.6.5 and 12.7.1. Securepoint UTM anterior a 12.6.5 maneja mal los códigos OTP. • https://wiki.securepoint.de/UTM/Changelog • CWE-287: Improper Authentication •
CVE-2023-47101
https://notcve.org/view.php?id=CVE-2023-47101
30 Oct 2023 — The installer (aka openvpn-client-installer) in Securepoint SSL VPN Client before 2.0.40 allows local privilege escalation during installation or repair. El instalador (también conocido como openvpn-client-installer) en Securepoint SSL VPN Client anterior a 2.0.40 permite la escalada de privilegios locales durante la instalación o reparación. • https://cyvisory.group/advisory/CYADV-2023-012 • CWE-269: Improper Privilege Management •
CVE-2023-22620 – SecurePoint UTM 12.x Session ID Leak
https://notcve.org/view.php?id=CVE-2023-22620
12 Apr 2023 — An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows sessionid information disclosure via an invalid authentication attempt. This can afterwards be used to bypass the device's authentication and get access to the administrative interface. SecurePoint UTM versions 12.x suffers from a session identifier leak vulnerability via the spcgi.cgi endpoint. • http://packetstormsecurity.com/files/171924/SecurePoint-UTM-12.x-Session-ID-Leak.html • CWE-863: Incorrect Authorization •
CVE-2023-22897 – SecurePoint UTM 12.x Memory Leak
https://notcve.org/view.php?id=CVE-2023-22897
12 Apr 2023 — An issue was discovered in SecurePoint UTM before 12.2.5.1. The firewall's endpoint at /spcgi.cgi allows information disclosure of memory contents to be achieved by an authenticated user. Essentially, uninitialized data can be retrieved via an approach in which a sessionid is obtained but not used. SecurePoint UTM versions 12.x suffers from a memory leak vulnerability via the spcgi.cgi endpoint. • http://packetstormsecurity.com/files/171928/SecurePoint-UTM-12.x-Memory-Leak.html • CWE-908: Use of Uninitialized Resource •
CVE-2021-35523 – Securepoint SSL VPN Client 2.0.30 Local Privilege Escalation
https://notcve.org/view.php?id=CVE-2021-35523
28 Jun 2021 — Securepoint SSL VPN Client v2 before 2.0.32 on Windows has unsafe configuration handling that enables local privilege escalation to NT AUTHORITY\SYSTEM. A non-privileged local user can modify the OpenVPN configuration stored under "%APPDATA%\Securepoint SSL VPN" and add a external script file that is executed as privileged user. Securepoint SSL VPN Client versiones v2 anteriores a 2.0.32, en Windows, presenta un manejo de configuración no seguro que permite una escalada de privilegios local a NT AUTHORITY\S... • http://packetstormsecurity.com/files/163320/Securepoint-SSL-VPN-Client-2.0.30-Local-Privilege-Escalation.html • CWE-269: Improper Privilege Management •