ID

VAR-201401-0430


CVE

CVE-2014-1672


TITLE

Check Point Security Gateway and Management Server Vulnerable to access restrictions

Trust: 0.8

sources: JVNDB: JVNDB-2014-001262

DESCRIPTION

Check Point R75.47 Security Gateway and Management Server does not properly enforce Anti-Spoofing when the routing table is modified and the "Get - Interfaces with Topology" action is performed, which allows attackers to bypass intended access restrictions. Attackers can exploit this issue to conduct spoofing attacks, bypass certain security restrictions, and gain unauthorized access; other attacks are also possible. The following products are vulnerable: Check Point Security Gateway version R75.47 Check Point Security Management Server version R75.47

Trust: 1.98

sources: NVD: CVE-2014-1672 // JVNDB: JVNDB-2014-001262 // BID: 65151 // VULHUB: VHN-69611

AFFECTED PRODUCTS

vendor:checkpointmodel:management serverscope:eqversion:r75.47

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r75.47

Trust: 1.6

vendor:check pointmodel:management serverscope:eqversion:r75.47

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:r75.47

Trust: 0.8

vendor:checkmodel:point software security management server r75.47scope: - version: -

Trust: 0.3

vendor:checkmodel:point software security gateways r75.47scope: - version: -

Trust: 0.3

sources: BID: 65151 // JVNDB: JVNDB-2014-001262 // CNNVD: CNNVD-201401-541 // NVD: CVE-2014-1672

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2014-1672
value: MEDIUM

Trust: 1.0

NVD: CVE-2014-1672
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-201401-541
value: MEDIUM

Trust: 0.6

VULHUB: VHN-69611
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2014-1672
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

VULHUB: VHN-69611
severity: MEDIUM
baseScore: 4.0
vectorString: AV:N/AC:H/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: HIGH
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 4.9
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: VULHUB: VHN-69611 // JVNDB: JVNDB-2014-001262 // CNNVD: CNNVD-201401-541 // NVD: CVE-2014-1672

PROBLEMTYPE DATA

problemtype:CWE-264

Trust: 1.9

sources: VULHUB: VHN-69611 // JVNDB: JVNDB-2014-001262 // NVD: CVE-2014-1672

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201401-541

TYPE

permissions and access control

Trust: 0.6

sources: CNNVD: CNNVD-201401-541

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001262

PATCH

title:Anti-Spoofing might be enforced incorrectly in specific scenarios on R75.47 Security Gatewayurl:https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98087

Trust: 0.8

title:SmartConsole_R75_47_HFurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=47705

Trust: 0.6

sources: JVNDB: JVNDB-2014-001262 // CNNVD: CNNVD-201401-541

EXTERNAL IDS

db:NVDid:CVE-2014-1672

Trust: 2.8

db:JVNDBid:JVNDB-2014-001262

Trust: 0.8

db:CNNVDid:CNNVD-201401-541

Trust: 0.7

db:BIDid:65151

Trust: 0.4

db:VULHUBid:VHN-69611

Trust: 0.1

sources: VULHUB: VHN-69611 // BID: 65151 // JVNDB: JVNDB-2014-001262 // CNNVD: CNNVD-201401-541 // NVD: CVE-2014-1672

REFERENCES

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk98087

Trust: 1.9

url:https://exchange.xforce.ibmcloud.com/vulnerabilities/90976

Trust: 1.1

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2014-1672

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2014-1672

Trust: 0.8

url:http://www.checkpoint.com/index.html

Trust: 0.3

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk98087

Trust: 0.1

sources: VULHUB: VHN-69611 // BID: 65151 // JVNDB: JVNDB-2014-001262 // CNNVD: CNNVD-201401-541 // NVD: CVE-2014-1672

CREDITS

Vendor reported this issue.

Trust: 0.3

sources: BID: 65151

SOURCES

db:VULHUBid:VHN-69611
db:BIDid:65151
db:JVNDBid:JVNDB-2014-001262
db:CNNVDid:CNNVD-201401-541
db:NVDid:CVE-2014-1672

LAST UPDATE DATE

2025-04-11T23:12:47.457000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-69611date:2018-01-03T00:00:00
db:BIDid:65151date:2014-01-14T00:00:00
db:JVNDBid:JVNDB-2014-001262date:2014-01-28T00:00:00
db:CNNVDid:CNNVD-201401-541date:2014-01-28T00:00:00
db:NVDid:CVE-2014-1672date:2025-04-11T00:51:21.963

SOURCES RELEASE DATE

db:VULHUBid:VHN-69611date:2014-01-26T00:00:00
db:BIDid:65151date:2014-01-14T00:00:00
db:JVNDBid:JVNDB-2014-001262date:2014-01-28T00:00:00
db:CNNVDid:CNNVD-201401-541date:2014-01-28T00:00:00
db:NVDid:CVE-2014-1672date:2014-01-26T01:55:26.780