CVE-2005-4093
Check Point VPN-1 SecureClient 4.0 < 4.1 - Policy Bypass
Severity Score
6.5
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
1
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2005-12-07 First Exploit
- 2005-12-08 CVE Reserved
- 2005-12-08 CVE Published
- 2023-03-14 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-264: Permissions, Privileges, and Access Controls
CAPEC
References (10)
URL | Tag | Source |
---|---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html | Mailing List | |
http://securitytracker.com/id?1015326 | Vdb Entry | |
http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html | X_refsource_misc | |
http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html | X_refsource_misc | |
http://www.securityfocus.com/bid/15757 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/26754 | 2005-12-07 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/17837 | 2023-11-07 | |
http://secunia.com/advisories/23395 | 2023-11-07 | |
http://www.us.debian.org/security/2006/dsa-1237 | 2023-11-07 | |
http://www.vupen.com/english/advisories/2005/2808 | 2023-11-07 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Checkpoint Search vendor "Checkpoint" | Secureclient Ng Search vendor "Checkpoint" for product "Secureclient Ng" | * | fp1 |
Affected
| ||||||
Checkpoint Search vendor "Checkpoint" | Secureclient Ng Search vendor "Checkpoint" for product "Secureclient Ng" | r56 Search vendor "Checkpoint" for product "Secureclient Ng" and version "r56" | - |
Affected
| ||||||
Checkpoint Search vendor "Checkpoint" | Vpn-1 Secureclient Search vendor "Checkpoint" for product "Vpn-1 Secureclient" | 4.0 Search vendor "Checkpoint" for product "Vpn-1 Secureclient" and version "4.0" | - |
Affected
| ||||||
Checkpoint Search vendor "Checkpoint" | Vpn-1 Secureclient Search vendor "Checkpoint" for product "Vpn-1 Secureclient" | 4.1 Search vendor "Checkpoint" for product "Vpn-1 Secureclient" and version "4.1" | - |
Affected
|