Vulnerability Name: | CVE-2000-0808 (CCN-5137) | ||||||||
Assigned: | 2000-08-02 | ||||||||
Published: | 2000-08-02 | ||||||||
Updated: | 2017-10-10 | ||||||||
Summary: | The seed generation mechanism in the inter-module S/Key authentication mechanism in Check Point VPN-1/FireWall-1 4.1 and earlier allows remote attackers to bypass authentication via a brute force attack, aka "One-time (s/key) Password Authentication." | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2000-0808 Source: CCN Type: Check Point Technical Support Alert Potential Security Issues Recently Identified in VPN-1/FireWall-1 Source: CONFIRM Type: UNKNOWN http://www.checkpoint.com/techsupport/alerts/list_vun.html#One-time_Password Source: CCN Type: CIAC Information Bulletin K-073 Multiple Vulnerabilities in Check Point Firewall-1 Source: CCN Type: Data Protect GmbH Web site A Stateful Inspection of FireWall-1 Source: CCN Type: Internet Security Systems Security Alert #62 Multiple vulnerabilities on all platforms and versions of Check Point FireWall-1 Source: OSVDB Type: UNKNOWN 4421 Source: CCN Type: OSVDB ID: 4421 Check Point FireWall-1 Localhost Authentication Spoofing Source: XF Type: UNKNOWN fw1-localhost-auth(5137) Source: XF Type: UNKNOWN fw1-localhost-auth(5137) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |