Vulnerability Scanning Solutions, LLC.
Our Process
What We Scan For
Sample Report
Client List
Contact Us
What We Scan For
Family: Firewalls --> Category: infos

Checkpoint SecuRemote information leakage Vulnerability Scan

Vulnerability Scan Summary
Checkpoint SecuRemote information leakage

Detailed Explanation for this Vulnerability Test

The remote host seems to be a Checkpoint FireWall-1 running SecuRemote.
The SecuRemote service contains a vulnerability that allows attackers
to gain information about the hosts, networks, and users configured on
the Firewall.

This will enable attackers to focus their attack strategy.

You should not let this information leak out.

Either block the SecuRemote's ports (TCP 256 and 264) to untrusted networks,
or upgrade to the latest version of Checkpoint's Firewall-1.

You could restrict the topology download, so that only authenticated
users can download it.
Go to Policy Properties Desktop Security of your Policy Editor and
uncheck 'respond to unauthenticated topology requests'.
After installing the Policy only authenticated Users can download
the Topology.

Threat Level: Medium

Reference :

For More Information:

Click HERE for more information and discussions on this network vulnerability scan.


P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.