The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.
References
Link | Resource |
---|---|
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk180271 | Mitigation Patch Vendor Advisory |
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk180271 | Mitigation Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 06:49
Type | Values Removed | Values Added |
---|---|---|
References | () https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk180271 - Mitigation, Patch, Vendor Advisory |
Information
Published : 2022-11-30 19:15
Updated : 2024-11-21 06:49
NVD link : CVE-2022-23746
Mitre link : CVE-2022-23746
CVE.ORG link : CVE-2022-23746
JSON object : View
Products Affected
checkpoint
- ssl_network_extender
CWE
CWE-307
Improper Restriction of Excessive Authentication Attempts