The seed generation mechanism in the inter-module S/Key authentication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass authentication via a brute force attack, aka "One-time (s/key) Password Authentication."
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:33
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.checkpoint.com/techsupport/alerts/list_vun.html#One-time_Password - | |
References | () http://www.osvdb.org/4421 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/5137 - |
Information
Published : 2000-11-14 05:00
Updated : 2024-11-20 23:33
NVD link : CVE-2000-0808
Mitre link : CVE-2000-0808
CVE.ORG link : CVE-2000-0808
JSON object : View
Products Affected
checkpoint
- firewall-1
CWE