Vulnerability Name: | CVE-2007-3489 (CCN-35103) | ||||||||
Assigned: | 2007-06-21 | ||||||||
Published: | 2007-06-21 | ||||||||
Updated: | 2018-10-16 | ||||||||
Summary: | Cross-site request forgery (CSRF) vulnerability in pop/WizU.html in the management interface in Check Point VPN-1 Edge X Embedded NGX 7.0.33x on the Check Point VPN-1 UTM Edge allows remote attackers to perform privileged actions as administrators, as demonstrated by a request with the swuuser and swupass parameters, which adds an administrator account. Note: the CSRF attack has no timing window because there is no logout capability in the management interface. | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
3.8 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-3489 Source: OSVDB Type: UNKNOWN 37645 Source: CCN Type: SA25853 Check Point VPN-1 UTM Edge Cross-Site Request Forgery Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 25853 Source: SREASON Type: UNKNOWN 2848 Source: CCN Type: Check Point Downloads Web site Check Point: Download Software Source: CCN Type: Louhi Networks Oy Security Advisory 2007/06/26 Checkpoint VPN-1 UTM Edge cross site request forgery Source: MISC Type: UNKNOWN http://www.louhi.fi/advisory/checkpoint_070626.txt Source: CCN Type: OSVDB ID: 37645 Check Point VPN-1 Edge pop/WizU.html CSRF Source: BUGTRAQ Type: UNKNOWN 20070627 CheckPoint VPN-1 UTM Edge Cross Site Request Forgery vulnerability Source: VUPEN Type: UNKNOWN ADV-2007-2363 Source: XF Type: UNKNOWN checkpoint-vpn1edge-unspecified-csrf(35103) Source: XF Type: UNKNOWN checkpoint-vpn1edge-unspecified-csrf(35103) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
BACK |