ID

VAR-201404-0291


CVE

CVE-2013-7350


TITLE

Check Point Security Gateway Vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2014-001865

DESCRIPTION

Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to "important security fixes.". Founded in 1993, Check Point Software Technologies is headquartered in Redwood City, Calif., and is the world's leading provider of Internet security solutions, leading the global enterprise firewall, personal firewall and virtual private network (VPN) markets. There are multiple vulnerabilities in Check Point's multiple products. There are currently no detailed vulnerability descriptions. The impact of these issues is currently unknown. We will update this BID as more information emerges. The following products are affected: Security Gateway 80 R71.x and R75.20.x 600 Appliance R75.20.x 1100 Appliance R75.20.x. Please keep an eye on the cnnvd website or manufacturer announcements

Trust: 2.52

sources: NVD: CVE-2013-7350 // JVNDB: JVNDB-2014-001865 // CNVD: CNVD-2014-01251 // BID: 66598 // VULHUB: VHN-67352

IOT TAXONOMY

category:['Network device']sub_category: -

Trust: 0.6

sources: CNVD: CNVD-2014-01251

AFFECTED PRODUCTS

vendor:checkpointmodel:security gatewayscope:eqversion:r75.20

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r71.00

Trust: 1.6

vendor:checkpointmodel:security gatewayscope:eqversion:r71.45

Trust: 1.6

vendor:check pointmodel:security gatewayscope:ltversion:r71.x

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:1100 the appliance r75.20.42

Trust: 0.8

vendor:check pointmodel:security gatewayscope:ltversion:r75.20.x

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:80 r71.45 (730159141)

Trust: 0.8

vendor:check pointmodel:security gatewayscope:eqversion:600 the appliance r75.20.42

Trust: 0.8

vendor:checkmodel:point appliance r75.20 hfascope:eqversion:60042

Trust: 0.6

vendor:checkmodel:point appliance r75.20 hfascope:eqversion:100042

Trust: 0.6

vendor:checkmodel:point security gateway r71.45scope:eqversion:80

Trust: 0.6

vendor:checkmodel:point software security gateway r75.20scope:eqversion:80

Trust: 0.3

vendor:checkmodel:point software security gateway r71.45scope:eqversion:80

Trust: 0.3

vendor:checkmodel:point software security gateway r71.00scope:eqversion:80

Trust: 0.3

vendor:checkmodel:point software appliance r75.20scope:eqversion:600

Trust: 0.3

vendor:checkmodel:point software appliance r75.20scope:eqversion:1000

Trust: 0.3

vendor:checkmodel:point software security gateway r75.20.4scope:neversion:80

Trust: 0.3

vendor:checkmodel:point software security gateway r71.45scope:neversion:80(730159141)

Trust: 0.3

vendor:checkmodel:point software appliance r75.20.42scope:neversion:600

Trust: 0.3

vendor:checkmodel:point software appliance r75.20.42scope:neversion:1000

Trust: 0.3

sources: CNVD: CNVD-2014-01251 // BID: 66598 // JVNDB: JVNDB-2014-001865 // CNNVD: CNNVD-201404-015 // NVD: CVE-2013-7350

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2013-7350
value: HIGH

Trust: 1.0

NVD: CVE-2013-7350
value: HIGH

Trust: 0.8

CNVD: CNVD-2014-01251
value: MEDIUM

Trust: 0.6

CNNVD: CNNVD-201404-015
value: CRITICAL

Trust: 0.6

VULHUB: VHN-67352
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2013-7350
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.8

CNVD: CNVD-2014-01251
severity: MEDIUM
baseScore: 5.0
vectorString: AV:N/AC:L/AU:N/C:P/I:N/A:N
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: NONE
availabilityImpact: NONE
exploitabilityScore: 10.0
impactScore: 2.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.6

VULHUB: VHN-67352
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

sources: CNVD: CNVD-2014-01251 // VULHUB: VHN-67352 // JVNDB: JVNDB-2014-001865 // CNNVD: CNNVD-201404-015 // NVD: CVE-2013-7350

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2013-7350

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-201404-015

TYPE

lack of information

Trust: 0.6

sources: CNNVD: CNNVD-201404-015

CONFIGURATIONS

sources: JVNDB: JVNDB-2014-001865

PATCH

title:Security enhancements for 600 / 1100 Appliance and Security Gateway 80url:https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk98332&src=securityAlerts

Trust: 0.8

title:Patch Point multiple patches for multiple vulnerabilitiesurl:https://www.cnvd.org.cn/patchInfo/show/43858

Trust: 0.6

sources: CNVD: CNVD-2014-01251 // JVNDB: JVNDB-2014-001865

EXTERNAL IDS

db:NVDid:CVE-2013-7350

Trust: 2.8

db:OSVDBid:102745

Trust: 2.3

db:JVNDBid:JVNDB-2014-001865

Trust: 0.8

db:CNNVDid:CNNVD-201404-015

Trust: 0.7

db:CNVDid:CNVD-2014-01251

Trust: 0.6

db:BIDid:66598

Trust: 0.4

db:VULHUBid:VHN-67352

Trust: 0.1

sources: CNVD: CNVD-2014-01251 // VULHUB: VHN-67352 // BID: 66598 // JVNDB: JVNDB-2014-001865 // CNNVD: CNNVD-201404-015 // NVD: CVE-2013-7350

REFERENCES

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk98332&src=securityalerts

Trust: 1.9

url:http://osvdb.org/102745

Trust: 1.7

url:http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7350

Trust: 0.8

url:http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7350

Trust: 0.8

url:http://osvdb.com/show/osvdb/102745

Trust: 0.6

url:http://www.checkpoint.com

Trust: 0.3

url:https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=&solutionid=sk98332&src=securityalerts

Trust: 0.1

sources: CNVD: CNVD-2014-01251 // VULHUB: VHN-67352 // BID: 66598 // JVNDB: JVNDB-2014-001865 // CNNVD: CNNVD-201404-015 // NVD: CVE-2013-7350

CREDITS

Reported by the vendor.

Trust: 0.3

sources: BID: 66598

SOURCES

db:CNVDid:CNVD-2014-01251
db:VULHUBid:VHN-67352
db:BIDid:66598
db:JVNDBid:JVNDB-2014-001865
db:CNNVDid:CNNVD-201404-015
db:NVDid:CVE-2013-7350

LAST UPDATE DATE

2025-04-13T23:10:17.111000+00:00


SOURCES UPDATE DATE

db:CNVDid:CNVD-2014-01251date:2014-02-26T00:00:00
db:VULHUBid:VHN-67352date:2014-04-01T00:00:00
db:BIDid:66598date:2014-04-01T00:00:00
db:JVNDBid:JVNDB-2014-001865date:2014-04-02T00:00:00
db:CNNVDid:CNNVD-201404-015date:2014-04-03T00:00:00
db:NVDid:CVE-2013-7350date:2025-04-12T10:46:40.837

SOURCES RELEASE DATE

db:CNVDid:CNVD-2014-01251date:2014-02-26T00:00:00
db:VULHUBid:VHN-67352date:2014-04-01T00:00:00
db:BIDid:66598date:2014-04-01T00:00:00
db:JVNDBid:JVNDB-2014-001865date:2014-04-02T00:00:00
db:CNNVDid:CNNVD-201404-015date:2014-04-03T00:00:00
db:NVDid:CVE-2013-7350date:2014-04-01T06:35:53.387