VAR-201404-0291
Vulnerability from variot - Updated: 2023-12-18 13:24Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to "important security fixes.". Founded in 1993, Check Point Software Technologies is headquartered in Redwood City, Calif., and is the world's leading provider of Internet security solutions, leading the global enterprise firewall, personal firewall and virtual private network (VPN) markets. There are multiple vulnerabilities in Check Point's multiple products. There are currently no detailed vulnerability descriptions. The impact of these issues is currently unknown. We will update this BID as more information emerges. The following products are affected: Security Gateway 80 R71.x and R75.20.x 600 Appliance R75.20.x 1100 Appliance R75.20.x. Please keep an eye on the cnnvd website or manufacturer announcements
Show details on source website{
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
"affected_products": {
"@id": "https://www.variotdbs.pl/ref/affected_products"
},
"configurations": {
"@id": "https://www.variotdbs.pl/ref/configurations"
},
"credits": {
"@id": "https://www.variotdbs.pl/ref/credits"
},
"cvss": {
"@id": "https://www.variotdbs.pl/ref/cvss/"
},
"description": {
"@id": "https://www.variotdbs.pl/ref/description/"
},
"exploit_availability": {
"@id": "https://www.variotdbs.pl/ref/exploit_availability/"
},
"external_ids": {
"@id": "https://www.variotdbs.pl/ref/external_ids/"
},
"iot": {
"@id": "https://www.variotdbs.pl/ref/iot/"
},
"iot_taxonomy": {
"@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
},
"patch": {
"@id": "https://www.variotdbs.pl/ref/patch/"
},
"problemtype_data": {
"@id": "https://www.variotdbs.pl/ref/problemtype_data/"
},
"references": {
"@id": "https://www.variotdbs.pl/ref/references/"
},
"sources": {
"@id": "https://www.variotdbs.pl/ref/sources/"
},
"sources_release_date": {
"@id": "https://www.variotdbs.pl/ref/sources_release_date/"
},
"sources_update_date": {
"@id": "https://www.variotdbs.pl/ref/sources_update_date/"
},
"threat_type": {
"@id": "https://www.variotdbs.pl/ref/threat_type/"
},
"title": {
"@id": "https://www.variotdbs.pl/ref/title/"
},
"type": {
"@id": "https://www.variotdbs.pl/ref/type/"
}
},
"@id": "https://www.variotdbs.pl/vuln/VAR-201404-0291",
"affected_products": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/affected_products#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"model": "security gateway",
"scope": "eq",
"trust": 1.6,
"vendor": "checkpoint",
"version": "r71.45"
},
{
"model": "security gateway",
"scope": "eq",
"trust": 1.6,
"vendor": "checkpoint",
"version": "r75.20"
},
{
"model": "security gateway",
"scope": "eq",
"trust": 1.6,
"vendor": "checkpoint",
"version": "r71.00"
},
{
"model": "security gateway",
"scope": "lt",
"trust": 0.8,
"vendor": "check point",
"version": "r71.x"
},
{
"model": "security gateway",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "1100 the appliance r75.20.42"
},
{
"model": "security gateway",
"scope": "lt",
"trust": 0.8,
"vendor": "check point",
"version": "r75.20.x"
},
{
"model": "security gateway",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "80 r71.45 (730159141)"
},
{
"model": "security gateway",
"scope": "eq",
"trust": 0.8,
"vendor": "check point",
"version": "600 the appliance r75.20.42"
},
{
"model": "point appliance r75.20 hfa",
"scope": "eq",
"trust": 0.6,
"vendor": "check",
"version": "60042"
},
{
"model": "point appliance r75.20 hfa",
"scope": "eq",
"trust": 0.6,
"vendor": "check",
"version": "100042"
},
{
"model": "point security gateway r71.45",
"scope": "eq",
"trust": 0.6,
"vendor": "check",
"version": "80"
},
{
"model": "point software security gateway r75.20",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "80"
},
{
"model": "point software security gateway r71.45",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "80"
},
{
"model": "point software security gateway r71.00",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "80"
},
{
"model": "point software appliance r75.20",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "600"
},
{
"model": "point software appliance r75.20",
"scope": "eq",
"trust": 0.3,
"vendor": "check",
"version": "1000"
},
{
"model": "point software security gateway r75.20.4",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "80"
},
{
"model": "point software security gateway r71.45",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "80(730159141)"
},
{
"model": "point software appliance r75.20.42",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "600"
},
{
"model": "point software appliance r75.20.42",
"scope": "ne",
"trust": 0.3,
"vendor": "check",
"version": "1000"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"db": "BID",
"id": "66598"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001865"
},
{
"db": "NVD",
"id": "CVE-2013-7350"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
]
},
"configurations": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/configurations#",
"children": {
"@container": "@list"
},
"cpe_match": {
"@container": "@list"
},
"data": {
"@container": "@list"
},
"nodes": {
"@container": "@list"
}
},
"data": [
{
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:checkpoint:security_gateway:r75.20:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:checkpoint:security_gateway:r71.00:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:checkpoint:security_gateway:r71.45:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-7350"
}
]
},
"credits": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/credits#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Reported by the vendor.",
"sources": [
{
"db": "BID",
"id": "66598"
}
],
"trust": 0.3
},
"cve": "CVE-2013-7350",
"cvss": {
"@context": {
"cvssV2": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
},
"cvssV3": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
},
"severity": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/cvss/severity#"
},
"@id": "https://www.variotdbs.pl/ref/cvss/severity"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
},
"@id": "https://www.variotdbs.pl/ref/sources"
}
},
"data": [
{
"cvssV2": [
{
"acInsufInfo": false,
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "NVD",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"trust": 1.0,
"userInteractionRequired": false,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"acInsufInfo": null,
"accessComplexity": "Low",
"accessVector": "Network",
"authentication": "None",
"author": "NVD",
"availabilityImpact": "Complete",
"baseScore": 10.0,
"confidentialityImpact": "Complete",
"exploitabilityScore": null,
"id": "CVE-2013-7350",
"impactScore": null,
"integrityImpact": "Complete",
"obtainAllPrivilege": null,
"obtainOtherPrivilege": null,
"obtainUserPrivilege": null,
"severity": "High",
"trust": 0.8,
"userInteractionRequired": null,
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "CNVD",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"exploitabilityScore": 10.0,
"id": "CNVD-2014-01251",
"impactScore": 2.9,
"integrityImpact": "NONE",
"severity": "MEDIUM",
"trust": 0.6,
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
{
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"author": "VULHUB",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"exploitabilityScore": 10.0,
"id": "VHN-67352",
"impactScore": 10.0,
"integrityImpact": "COMPLETE",
"severity": "HIGH",
"trust": 0.1,
"vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
"version": "2.0"
}
],
"cvssV3": [],
"severity": [
{
"author": "NVD",
"id": "CVE-2013-7350",
"trust": 1.8,
"value": "HIGH"
},
{
"author": "CNVD",
"id": "CNVD-2014-01251",
"trust": 0.6,
"value": "MEDIUM"
},
{
"author": "CNNVD",
"id": "CNNVD-201404-015",
"trust": 0.6,
"value": "CRITICAL"
},
{
"author": "VULHUB",
"id": "VHN-67352",
"trust": 0.1,
"value": "HIGH"
}
]
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"db": "VULHUB",
"id": "VHN-67352"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001865"
},
{
"db": "NVD",
"id": "CVE-2013-7350"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
]
},
"description": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/description#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to \"important security fixes.\". Founded in 1993, Check Point Software Technologies is headquartered in Redwood City, Calif., and is the world\u0027s leading provider of Internet security solutions, leading the global enterprise firewall, personal firewall and virtual private network (VPN) markets. There are multiple vulnerabilities in Check Point\u0027s multiple products. There are currently no detailed vulnerability descriptions. \nThe impact of these issues is currently unknown. We will update this BID as more information emerges. \nThe following products are affected:\nSecurity Gateway 80 R71.x and R75.20.x\n600 Appliance R75.20.x\n1100 Appliance R75.20.x. Please keep an eye on the cnnvd website or manufacturer announcements",
"sources": [
{
"db": "NVD",
"id": "CVE-2013-7350"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001865"
},
{
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"db": "BID",
"id": "66598"
},
{
"db": "VULHUB",
"id": "VHN-67352"
}
],
"trust": 2.52
},
"external_ids": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/external_ids#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"db": "NVD",
"id": "CVE-2013-7350",
"trust": 2.8
},
{
"db": "OSVDB",
"id": "102745",
"trust": 2.3
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001865",
"trust": 0.8
},
{
"db": "CNNVD",
"id": "CNNVD-201404-015",
"trust": 0.7
},
{
"db": "CNVD",
"id": "CNVD-2014-01251",
"trust": 0.6
},
{
"db": "BID",
"id": "66598",
"trust": 0.4
},
{
"db": "VULHUB",
"id": "VHN-67352",
"trust": 0.1
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"db": "VULHUB",
"id": "VHN-67352"
},
{
"db": "BID",
"id": "66598"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001865"
},
{
"db": "NVD",
"id": "CVE-2013-7350"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
]
},
"id": "VAR-201404-0291",
"iot": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": true,
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"db": "VULHUB",
"id": "VHN-67352"
}
],
"trust": 1.7
},
"iot_taxonomy": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"category": [
"Network device"
],
"sub_category": null,
"trust": 0.6
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01251"
}
]
},
"last_update_date": "2023-12-18T13:24:56.421000Z",
"patch": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/patch#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"title": "Security enhancements for 600 / 1100 Appliance and Security Gateway 80",
"trust": 0.8,
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk98332\u0026src=securityalerts"
},
{
"title": "Patch Point multiple patches for multiple vulnerabilities",
"trust": 0.6,
"url": "https://www.cnvd.org.cn/patchinfo/show/43858"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001865"
}
]
},
"problemtype_data": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"problemtype": "NVD-CWE-noinfo",
"trust": 1.0
}
],
"sources": [
{
"db": "NVD",
"id": "CVE-2013-7350"
}
]
},
"references": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/references#",
"data": {
"@container": "@list"
},
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": [
{
"trust": 1.9,
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk98332\u0026src=securityalerts"
},
{
"trust": 1.7,
"url": "http://osvdb.org/102745"
},
{
"trust": 0.8,
"url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7350"
},
{
"trust": 0.8,
"url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7350"
},
{
"trust": 0.6,
"url": "http://osvdb.com/show/osvdb/102745"
},
{
"trust": 0.3,
"url": "http://www.checkpoint.com"
},
{
"trust": 0.1,
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026amp;solutionid=sk98332\u0026amp;src=securityalerts"
}
],
"sources": [
{
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"db": "VULHUB",
"id": "VHN-67352"
},
{
"db": "BID",
"id": "66598"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001865"
},
{
"db": "NVD",
"id": "CVE-2013-7350"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
]
},
"sources": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#",
"data": {
"@container": "@list"
}
},
"data": [
{
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"db": "VULHUB",
"id": "VHN-67352"
},
{
"db": "BID",
"id": "66598"
},
{
"db": "JVNDB",
"id": "JVNDB-2014-001865"
},
{
"db": "NVD",
"id": "CVE-2013-7350"
},
{
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
]
},
"sources_release_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"date": "2014-04-01T00:00:00",
"db": "VULHUB",
"id": "VHN-67352"
},
{
"date": "2014-04-01T00:00:00",
"db": "BID",
"id": "66598"
},
{
"date": "2014-04-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001865"
},
{
"date": "2014-04-01T06:35:53.387000",
"db": "NVD",
"id": "CVE-2013-7350"
},
{
"date": "2014-04-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
]
},
"sources_update_date": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
"data": {
"@container": "@list"
}
},
"data": [
{
"date": "2014-02-26T00:00:00",
"db": "CNVD",
"id": "CNVD-2014-01251"
},
{
"date": "2014-04-01T00:00:00",
"db": "VULHUB",
"id": "VHN-67352"
},
{
"date": "2014-04-01T00:00:00",
"db": "BID",
"id": "66598"
},
{
"date": "2014-04-02T00:00:00",
"db": "JVNDB",
"id": "JVNDB-2014-001865"
},
{
"date": "2014-04-01T15:19:52.370000",
"db": "NVD",
"id": "CVE-2013-7350"
},
{
"date": "2014-04-03T00:00:00",
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
]
},
"threat_type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/threat_type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "remote",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
],
"trust": 0.6
},
"title": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/title#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "Check Point Security Gateway Vulnerability in",
"sources": [
{
"db": "JVNDB",
"id": "JVNDB-2014-001865"
}
],
"trust": 0.8
},
"type": {
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/type#",
"sources": {
"@container": "@list",
"@context": {
"@vocab": "https://www.variotdbs.pl/ref/sources#"
}
}
},
"data": "lack of information",
"sources": [
{
"db": "CNNVD",
"id": "CNNVD-201404-015"
}
],
"trust": 0.6
}
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.