// For flags

CVE-2005-4093

Check Point VPN-1 SecureClient 4.0 < 4.1 - Policy Bypass

Severity Score

6.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
Single
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-12-07 First Exploit
  • 2005-12-08 CVE Reserved
  • 2005-12-08 CVE Published
  • 2023-03-14 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Checkpoint
Search vendor "Checkpoint"
Secureclient Ng
Search vendor "Checkpoint" for product "Secureclient Ng"
*fp1
Affected
Checkpoint
Search vendor "Checkpoint"
Secureclient Ng
Search vendor "Checkpoint" for product "Secureclient Ng"
r56
Search vendor "Checkpoint" for product "Secureclient Ng" and version "r56"
-
Affected
Checkpoint
Search vendor "Checkpoint"
Vpn-1 Secureclient
Search vendor "Checkpoint" for product "Vpn-1 Secureclient"
4.0
Search vendor "Checkpoint" for product "Vpn-1 Secureclient" and version "4.0"
-
Affected
Checkpoint
Search vendor "Checkpoint"
Vpn-1 Secureclient
Search vendor "Checkpoint" for product "Vpn-1 Secureclient"
4.1
Search vendor "Checkpoint" for product "Vpn-1 Secureclient" and version "4.1"
-
Affected