ID

VAR-200208-0021


CVE

CVE-2002-0428


TITLE

Check Point FW-1 SecuClient/SecuRemote Client Design Vulnerability

Trust: 0.9

sources: BID: 4253 // CNNVD: CNNVD-200208-186

DESCRIPTION

Check Point FireWall-1 SecuRemote/SecuClient 4.0 and 4.1 allows clients to bypass the "authentication timeout" by modifying the to_expire or expire values in the client's users.C configuration file. Check Point Firewall-1 is a popular firewall package available from Checkpoint Software Technologies. SecuClient/SecuRemote are VPN-1 implementations for Check Point Firewall-1 products. It is possible to configure a timeout value for cached user credentials. This value is stored on client systems and can be modified by users of client systems. If security policy includes a time limit on cached credentials, malicious authenticated users may bypass the policy by modifying the value. Depending on the operating system of the client host, local administrative privileges on the client host may be required to modify the configuration file. In addition to the timeout values, other sensitive information is reportedly stored on client systems. Further details are not known at this time. SecuClient/SecuRemote is the VPN-1 implementation in the Firewall-1 product. SecuClient/SecuRemote is flawed in design, allowing client-local attackers to bypass certain server-side settings. SecuClient/SecuRemote allows the server to set the time limit for caching authentication information, and if the time limit is exceeded, it will be forced to log in again

Trust: 1.26

sources: NVD: CVE-2002-0428 // BID: 4253 // VULHUB: VHN-4821

AFFECTED PRODUCTS

vendor:checkpointmodel:firewall-1scope:eqversion:4.0

Trust: 1.6

vendor:checkpointmodel:firewall-1scope:eqversion:4.1

Trust: 1.6

vendor:checkpointmodel:check point vpnscope:eqversion:1_4.1

Trust: 1.0

vendor:checkpointmodel:check point vpnscope:eqversion:1_4.1_sp1

Trust: 1.0

vendor:checkpointmodel:next generationscope:eqversion:*

Trust: 1.0

vendor:checkpointmodel:check point vpnscope:eqversion:1_4.1_sp2

Trust: 1.0

vendor:checkpointmodel:check point vpnscope:eqversion:1_4.1_sp4

Trust: 1.0

vendor:checkpointmodel:check point vpnscope:eqversion:1_4.1_sp3

Trust: 1.0

vendor:checkpointmodel:next generationscope: - version: -

Trust: 0.6

vendor:checkmodel:point software vpn-1 sp4scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp3scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp2scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1 sp1scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software vpn-1scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software nokia voyagerscope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp5scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp4scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp3scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp2scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp1scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1scope:eqversion:4.1

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp8scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp7scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp6scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp5scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp4scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp3scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp2scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1 sp1scope:eqversion:4.0

Trust: 0.3

vendor:checkmodel:point software firewall-1scope:eqversion:4.0

Trust: 0.3

sources: BID: 4253 // CNNVD: CNNVD-200208-186 // NVD: CVE-2002-0428

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2002-0428
value: HIGH

Trust: 1.0

CNNVD: CNNVD-200208-186
value: HIGH

Trust: 0.6

VULHUB: VHN-4821
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2002-0428
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

VULHUB: VHN-4821
severity: HIGH
baseScore: 7.5
vectorString: AV:N/AC:L/AU:N/C:P/I:P/A:P
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: PARTIAL
exploitabilityScore: 10.0
impactScore: 6.4
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-4821 // CNNVD: CNNVD-200208-186 // NVD: CVE-2002-0428

PROBLEMTYPE DATA

problemtype:NVD-CWE-Other

Trust: 1.0

sources: NVD: CVE-2002-0428

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-200208-186

TYPE

Design Error

Trust: 0.9

sources: BID: 4253 // CNNVD: CNNVD-200208-186

EXTERNAL IDS

db:NVDid:CVE-2002-0428

Trust: 2.0

db:BIDid:4253

Trust: 2.0

db:CNNVDid:CNNVD-200208-186

Trust: 0.7

db:BUGTRAQid:20020308 CHECKPOINT FW1 SECUREMOTE/SECURECLIENT "RE-AUTHENTICATION" (CLIENT SIDE HACKS OF USERS.C)

Trust: 0.6

db:XFid:1

Trust: 0.6

db:VULHUBid:VHN-4821

Trust: 0.1

sources: VULHUB: VHN-4821 // BID: 4253 // CNNVD: CNNVD-200208-186 // NVD: CVE-2002-0428

REFERENCES

url:http://www.securityfocus.com/bid/4253

Trust: 2.7

url:http://online.securityfocus.com/archive/1/260662

Trust: 2.7

url:http://www.iss.net/security_center/static/8423.php

Trust: 2.7

sources: VULHUB: VHN-4821 // CNNVD: CNNVD-200208-186 // NVD: CVE-2002-0428

CREDITS

Cedric Amand※ mailing-lists@cedric.net

Trust: 0.6

sources: CNNVD: CNNVD-200208-186

SOURCES

db:VULHUBid:VHN-4821
db:BIDid:4253
db:CNNVDid:CNNVD-200208-186
db:NVDid:CVE-2002-0428

LAST UPDATE DATE

2024-11-22T21:18:21.834000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-4821date:2008-09-05T00:00:00
db:BIDid:4253date:2009-07-11T10:56:00
db:CNNVDid:CNNVD-200208-186date:2006-09-05T00:00:00
db:NVDid:CVE-2002-0428date:2024-11-20T23:39:04.187

SOURCES RELEASE DATE

db:VULHUBid:VHN-4821date:2002-08-12T00:00:00
db:BIDid:4253date:2002-03-08T00:00:00
db:CNNVDid:CNNVD-200208-186date:2002-03-08T00:00:00
db:NVDid:CVE-2002-0428date:2002-08-12T04:00:00