Vulnerability Name: | CCN-10327 | ||||||
Published: | 2002-10-07 | ||||||
Updated: | 2002-10-07 | ||||||
Summary: | Check Point VPN-1 fails to properly respond to Internet Key Exchange (IKE) Aggressive Mode session requests. If a system is configured to negotiate sessions in a mode other than aggressive, it is still possible for a remote attacker to use SecuRemote or SecureClient's "IKE Aggressive Mode" authentication to bypass security restrictions and establish a session in aggressive mode. | ||||||
CVSS v3 Severity: | 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
| ||||||
CVSS v2 Severity: | 5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)
| ||||||
Vulnerability Consequences: | Bypass Security | ||||||
References: | Source: CCN Type: Check Point Software Web site Check Point Software Technologies: Support Services Source: CCN Type: Check Point Software Technologies Web site Alerts - IKE Aggressive Mode Source: CCN Type: BID-5920 Check Point VPN-1 IKE Aggressive Mode Forcing Vulnerability Source: CCN Type: BID-7423 IKE Aggressive Mode Shared Secret Hash Leakage Weakness Source: XF Type: UNKNOWN vpn1-ike-bypass-restrictions(10327) | ||||||
Vulnerable Configuration: | Configuration CCN 1: Denotes that component is vulnerable | ||||||
BACK |