Vulnerabilites related to checkpoint - gaia_os
CVE-2013-7311 (GCVE-0-2013-7311)
Vulnerability from cvelistv5
Published
2014-01-23 17:00
Modified
2024-09-16 23:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
References
▼ | URL | Tags |
---|---|---|
http://www.kb.cert.org/vuls/id/BLUU-985QRC | x_refsource_CONFIRM | |
https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk94490 | x_refsource_CONFIRM | |
http://www.kb.cert.org/vuls/id/229804 | third-party-advisory, x_refsource_CERT-VN |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T18:01:20.568Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/BLUU-985QRC" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk94490" }, { "name": "VU#229804", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/229804" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2014-01-23T17:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.kb.cert.org/vuls/id/BLUU-985QRC" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk94490" }, { "name": "VU#229804", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/229804" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2013-7311", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.kb.cert.org/vuls/id/BLUU-985QRC", "refsource": "CONFIRM", "url": "http://www.kb.cert.org/vuls/id/BLUU-985QRC" }, { "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk94490", "refsource": "CONFIRM", "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk94490" }, { "name": "VU#229804", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/229804" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2013-7311", "datePublished": "2014-01-23T17:00:00Z", "dateReserved": "2014-01-23T00:00:00Z", "dateUpdated": "2024-09-16T23:32:05.658Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-52885 (GCVE-0-2024-52885)
Vulnerability from cvelistv5
Published
2025-08-06 14:45
Modified
2025-08-06 15:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-35 - Path Traversal
Summary
The Mobile Access Portal's File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to list the file names of 'nobody'-accessible directories on the Mobile Access gateway.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
checkpoint | Check Point Mobile Access |
Version: Check Point Mobile Access versions R81.10, R81.20, R82 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52885", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-08-06T15:02:46.396665Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-08-06T15:03:53.437Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Check Point Mobile Access", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "Check Point Mobile Access versions R81.10, R81.20, R82" } ] } ], "descriptions": [ { "lang": "en", "value": "The Mobile Access Portal\u0027s File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to list the file names of \u0027nobody\u0027-accessible directories on the Mobile Access gateway." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-35", "description": "CWE-35: Path Traversal", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-08-06T14:45:43.182Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "url": "https://support.checkpoint.com/results/sk/sk183137" } ], "title": "Path Traversal" } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2024-52885", "datePublished": "2025-08-06T14:45:43.182Z", "dateReserved": "2024-11-17T08:00:07.201Z", "dateUpdated": "2025-08-06T15:03:53.437Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2021-30361 (GCVE-0-2021-30361)
Vulnerability from cvelistv5
Published
2022-05-11 16:42
Modified
2024-08-03 22:32
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Summary
The Check Point Gaia Portal's GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS.
References
▼ | URL | Tags |
---|---|---|
https://supportcontent.checkpoint.com/solutions?id=sk179128 | x_refsource_MISC |
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Check Point Gaia Portal |
Version: before Jumbo HFAs released 13-Apr-2022 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-03T22:32:41.127Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk179128" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Check Point Gaia Portal", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before Jumbo HFAs released 13-Apr-2022" } ] } ], "descriptions": [ { "lang": "en", "value": "The Check Point Gaia Portal\u0027s GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS." } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-78", "description": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2022-05-11T16:42:52", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk179128" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@checkpoint.com", "ID": "CVE-2021-30361", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Check Point Gaia Portal", "version": { "version_data": [ { "version_value": "before Jumbo HFAs released 13-Apr-2022" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The Check Point Gaia Portal\u0027s GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "CWE-78: Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" } ] } ] }, "references": { "reference_data": [ { "name": "https://supportcontent.checkpoint.com/solutions?id=sk179128", "refsource": "MISC", "url": "https://supportcontent.checkpoint.com/solutions?id=sk179128" } ] } } } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2021-30361", "datePublished": "2022-05-11T16:42:52", "dateReserved": "2021-04-07T00:00:00", "dateUpdated": "2024-08-03T22:32:41.127Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-24914 (GCVE-0-2024-24914)
Vulnerability from cvelistv5
Published
2024-11-07 11:25
Modified
2024-11-07 17:33
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-914 - Improper Control of Dynamically-Identified Variables
Summary
Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
checkpoint | ClusterXL, Multi-Domain Security Management, Quantum Appliances, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, Quantum Security Management |
Version: Check Point Quantum Gateways versions R81, R81.10, R81.20 |
{ "containers": { "adp": [ { "affected": [ { "cpes": [ "cpe:2.3:a:checkpoint:clusterxl:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "clusterxl", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:multi-domain_management:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "multi-domain_management", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_appliances:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_appliances", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_maestro:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_maestro", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_scalable_chassis:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_scalable_chassis", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_security_gateway:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_security_gateway", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] }, { "cpes": [ "cpe:2.3:a:checkpoint:quantum_security_management:*:*:*:*:*:*:*:*" ], "defaultStatus": "unknown", "product": "quantum_security_management", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "r81" }, { "status": "affected", "version": "r81.10" }, { "status": "affected", "version": "r81.20" } ] } ], "metrics": [ { "other": { "content": { "id": "CVE-2024-24914", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "total" } ], "role": "CISA Coordinator", "timestamp": "2024-11-07T16:56:57.795526Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2024-11-07T17:33:31.286Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "ClusterXL, Multi-Domain Security Management, Quantum Appliances, Quantum Maestro, Quantum Scalable Chassis, Quantum Security Gateways, Quantum Security Management", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "Check Point Quantum Gateways versions R81, R81.10, R81.20" } ] } ], "descriptions": [ { "lang": "en", "value": "Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-914", "description": "CWE-914: Improper Control of Dynamically-Identified Variables", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2024-11-07T11:25:53.238Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "url": "https://support.checkpoint.com/results/sk/sk182743" } ] } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2024-24914", "datePublished": "2024-11-07T11:25:53.238Z", "dateReserved": "2024-02-01T15:19:26.278Z", "dateUpdated": "2024-11-07T17:33:31.286Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-52887 (GCVE-0-2024-52887)
Vulnerability from cvelistv5
Published
2025-04-27 07:46
Modified
2025-04-28 16:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
Summary
Authenticated end-user may set a specially crafted SNX bookmark that can make their browser run a script while accessing their own bookmark list.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
checkpoint | Check Point Mobile Access |
Version: Check Point Mobile Access versions R81.10, R81.20, R82 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52887", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-28T15:49:03.217887Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-28T16:31:21.597Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Check Point Mobile Access", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "Check Point Mobile Access versions R81.10, R81.20, R82" } ] } ], "descriptions": [ { "lang": "en", "value": "Authenticated end-user may set a specially crafted SNX bookmark that can make their browser run a script while accessing their own bookmark list." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027).", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-27T07:46:23.027Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "url": "https://support.checkpoint.com/results/sk/sk183054" } ], "title": "Self-XSS" } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2024-52887", "datePublished": "2025-04-27T07:46:23.027Z", "dateReserved": "2024-11-17T08:00:07.201Z", "dateUpdated": "2025-04-28T16:31:21.597Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2024-52888 (GCVE-0-2024-52888)
Vulnerability from cvelistv5
Published
2025-04-27 07:46
Modified
2025-04-28 16:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting').
Summary
For an authenticated end-user the portal may run a script while attempting to display a directory or some file's properties.
References
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
checkpoint | Check Point Mobile Access |
Version: Check Point Mobile Access versions R81.10, R81.20, R82 |
{ "containers": { "adp": [ { "metrics": [ { "other": { "content": { "id": "CVE-2024-52888", "options": [ { "Exploitation": "none" }, { "Automatable": "no" }, { "Technical Impact": "partial" } ], "role": "CISA Coordinator", "timestamp": "2025-04-28T15:48:42.433559Z", "version": "2.0.3" }, "type": "ssvc" } } ], "providerMetadata": { "dateUpdated": "2025-04-28T16:31:15.797Z", "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0", "shortName": "CISA-ADP" }, "title": "CISA ADP Vulnrichment" } ], "cna": { "affected": [ { "product": "Check Point Mobile Access", "vendor": "checkpoint", "versions": [ { "status": "affected", "version": "Check Point Mobile Access versions R81.10, R81.20, R82" } ] } ], "descriptions": [ { "lang": "en", "value": "For an authenticated end-user the portal may run a script while attempting to display a directory or some file\u0027s properties." } ], "metrics": [ { "cvssV3_1": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "format": "CVSS", "scenarios": [ { "lang": "en", "value": "GENERAL" } ] } ], "problemTypes": [ { "descriptions": [ { "cweId": "CWE-79", "description": "CWE-79: Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027).", "lang": "en", "type": "CWE" } ] } ], "providerMetadata": { "dateUpdated": "2025-04-27T07:46:53.542Z", "orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "shortName": "checkpoint" }, "references": [ { "url": "https://support.checkpoint.com/results/sk/sk183055" } ], "title": "Stored-XSS" } }, "cveMetadata": { "assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45", "assignerShortName": "checkpoint", "cveId": "CVE-2024-52888", "datePublished": "2025-04-27T07:46:53.542Z", "dateReserved": "2024-11-17T08:00:07.201Z", "dateUpdated": "2025-04-28T16:31:15.797Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2024-11-07 12:15
Modified
2025-08-26 16:40
Severity ?
Summary
Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available.
References
▼ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://support.checkpoint.com/results/sk/sk182743 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | gaia_os | r81 | |
checkpoint | gaia_os | r81.10 | |
checkpoint | gaia_os | r81.20 | |
checkpoint | clusterxl | - | |
checkpoint | multi-domain_management | - | |
checkpoint | quantum_6700 | - | |
checkpoint | quantum_maestro | - | |
checkpoint | quantum_scalable_chassis | - | |
checkpoint | quantum_security_gateway | - | |
checkpoint | quantum_security_management | - | |
checkpoint | quantum_spark | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81:*:*:*:*:*:*:*", "matchCriteriaId": "C580EA73-A731-497E-885E-F00854E07EA9", "vulnerable": true }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*", "matchCriteriaId": "55864700-51C8-4540-B4B2-05CE4C7FC245", "vulnerable": true }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*", "matchCriteriaId": "3BE80E1E-02E1-44E3-B309-3079F0F5A89C", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:clusterxl:-:*:*:*:*:*:*:*", "matchCriteriaId": "99149C44-7498-44F9-8771-FD37CA2BE738", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:multi-domain_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "1584E1B4-412C-40E2-BF07-4E464692F2AE", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_6700:-:*:*:*:*:*:*:*", "matchCriteriaId": "CA698703-C5F2-4EA2-B272-0B0A0D26E2FD", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_maestro:-:*:*:*:*:*:*:*", "matchCriteriaId": "5C9C13E7-3B79-4AC8-B559-266DDE871169", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_scalable_chassis:-:*:*:*:*:*:*:*", "matchCriteriaId": "2411E997-F970-4F47-AA08-B8F1A06EBB3E", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "9016DDF6-285C-4E64-88D0-29ECCEF048F8", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "08601413-25E2-4977-B67A-C11A9D788EA8", "vulnerable": false }, { "criteria": "cpe:2.3:h:checkpoint:quantum_spark:-:*:*:*:*:*:*:*", "matchCriteriaId": "FC94897D-88D2-4F56-BEBC-04899FE17197", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated Gaia users can inject code or commands by global variables through special HTTP requests. A Security fix that mitigates this vulnerability is available." }, { "lang": "es", "value": "Los usuarios autenticados de Gaia pueden inyectar c\u00f3digo o comandos mediante variables globales a trav\u00e9s de solicitudes HTTP especiales. Hay disponible una soluci\u00f3n de seguridad que mitiga esta vulnerabilidad." } ], "id": "CVE-2024-24914", "lastModified": "2025-08-26T16:40:18.067", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "ADJACENT_NETWORK", "availabilityImpact": "HIGH", "baseScore": 8.0, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:A/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 5.9, "source": "cve@checkpoint.com", "type": "Secondary" } ] }, "published": "2024-11-07T12:15:24.327", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk182743" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-914" } ], "source": "cve@checkpoint.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2025-08-06 15:15
Modified
2025-08-27 14:21
Severity ?
5.0 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Summary
The Mobile Access Portal's File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to list the file names of 'nobody'-accessible directories on the Mobile Access gateway.
References
▼ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://support.checkpoint.com/results/sk/sk183137 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | mobile_access | - | |
checkpoint | remote_access_vpn | - | |
checkpoint | gaia_os | r81.10 | |
checkpoint | gaia_os | r81.20 | |
checkpoint | gaia_os | r82 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:mobile_access:-:*:*:*:*:*:*:*", "matchCriteriaId": "615942BD-BD17-41D7-8581-F5B7C7937BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:remote_access_vpn:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CE7D305-2FF3-4003-8127-C2DB68E06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*", "matchCriteriaId": "55864700-51C8-4540-B4B2-05CE4C7FC245", "vulnerable": false }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*", "matchCriteriaId": "3BE80E1E-02E1-44E3-B309-3079F0F5A89C", "vulnerable": false }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r82:*:*:*:*:*:*:*", "matchCriteriaId": "6443AE50-1CB5-4D00-8C8D-97DB966687DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Mobile Access Portal\u0027s File Share application is vulnerable to a directory traversal attack, allowing an authenticated, malicious end-user (authorized to at least one File Share application) to list the file names of \u0027nobody\u0027-accessible directories on the Mobile Access gateway." }, { "lang": "es", "value": "La aplicaci\u00f3n Mobile Access Portal\u0027s File Share es vulnerable a un ataque de directory traversal, lo que permite que un usuario final malintencionado y autenticado (autorizado a al menos una aplicaci\u00f3n File Share) enumere los nombres de archivos de directorios a los que \"nadie\" puede acceder en el portal de acceso m\u00f3vil." } ], "id": "CVE-2024-52885", "lastModified": "2025-08-27T14:21:06.577", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.0, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:L/I:N/A:N", "version": "3.1" }, "exploitabilityScore": 3.1, "impactScore": 1.4, "source": "cve@checkpoint.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-08-06T15:15:31.287", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk183137" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-35" } ], "source": "cve@checkpoint.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-04-27 08:15
Modified
2025-09-02 18:37
Severity ?
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
For an authenticated end-user the portal may run a script while attempting to display a directory or some file's properties.
References
▼ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://support.checkpoint.com/results/sk/sk183055 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | mobile_access | - | |
checkpoint | remote_access_vpn | - | |
checkpoint | gaia_os | r81.10 | |
checkpoint | gaia_os | r81.20 | |
checkpoint | gaia_os | r82 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:mobile_access:-:*:*:*:*:*:*:*", "matchCriteriaId": "615942BD-BD17-41D7-8581-F5B7C7937BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:remote_access_vpn:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CE7D305-2FF3-4003-8127-C2DB68E06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*", "matchCriteriaId": "55864700-51C8-4540-B4B2-05CE4C7FC245", "vulnerable": false }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*", "matchCriteriaId": "3BE80E1E-02E1-44E3-B309-3079F0F5A89C", "vulnerable": false }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r82:*:*:*:*:*:*:*", "matchCriteriaId": "6443AE50-1CB5-4D00-8C8D-97DB966687DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "For an authenticated end-user the portal may run a script while attempting to display a directory or some file\u0027s properties." }, { "lang": "es", "value": "Para un usuario final autenticado, el portal puede ejecutar un script mientras intenta mostrar un directorio o las propiedades de alg\u00fan archivo." } ], "id": "CVE-2024-52888", "lastModified": "2025-09-02T18:37:15.293", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "cve@checkpoint.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-04-27T08:15:14.220", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk183055" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "cve@checkpoint.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2014-01-23 17:55
Modified
2025-04-11 00:51
Severity ?
Summary
The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | gaia_os | r75.0 | |
checkpoint | gaia_os | r76.0 | |
checkpoint | ipso_os | 6.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r75.0:*:*:*:*:*:*:*", "matchCriteriaId": "108B6F13-FD59-4790-B873-EED143387841", "vulnerable": true }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r76.0:*:*:*:*:*:*:*", "matchCriteriaId": "6D082271-E8DE-445C-99AA-A04D8789110F", "vulnerable": true }, { "criteria": "cpe:2.3:o:checkpoint:ipso_os:6.2:*:*:*:*:*:*:*", "matchCriteriaId": "89AC8A11-E5F4-4614-9C9D-65122AF92A97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The OSPF implementation in Check Point Gaia OS R75.X and R76 and IPSO OS 6.2 R75.X and R76 does not consider the possibility of duplicate Link State ID values in Link State Advertisement (LSA) packets before performing operations on the LSA database, which allows remote attackers to cause a denial of service (routing disruption) or obtain sensitive packet information via a crafted LSA packet, a related issue to CVE-2013-0149." }, { "lang": "es", "value": "La implementaci\u00f3n OSPF en Check Point Gaia OS R75.X y R76 e IPSO OS 6.2 R75.X y R76 no considera la posibilidad de valores Link State ID duplicados en paquetes Link State Advertisement (LSA) antes de realizar operaciones en la base de datos LSA, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (interrupci\u00f3n de enrutamiento) u obtener informaci\u00f3n sensible de paquetes a trav\u00e9s de un paquete LSA manipulado, una vulnerabilidad relacionada con CVE-2013-0149." } ], "evaluatorComment": "Per: http://cwe.mitre.org/data/definitions/694.html\n\n\"CWE-694: Use of Multiple Resources with Duplicate Identifier\"", "id": "CVE-2013-7311", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "ADJACENT_NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.4, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:A/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 5.5, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2014-01-23T17:55:05.477", "references": [ { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/229804" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/BLUU-985QRC" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk94490" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/229804" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/BLUU-985QRC" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk94490" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-Other" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2025-04-27 08:15
Modified
2025-09-02 18:37
Severity ?
3.5 (Low) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
5.4 (Medium) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
Summary
Authenticated end-user may set a specially crafted SNX bookmark that can make their browser run a script while accessing their own bookmark list.
References
▼ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://support.checkpoint.com/results/sk/sk183054 | Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | mobile_access | - | |
checkpoint | remote_access_vpn | - | |
checkpoint | gaia_os | r81.10 | |
checkpoint | gaia_os | r81.20 | |
checkpoint | gaia_os | r82 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:mobile_access:-:*:*:*:*:*:*:*", "matchCriteriaId": "615942BD-BD17-41D7-8581-F5B7C7937BD5", "vulnerable": true }, { "criteria": "cpe:2.3:a:checkpoint:remote_access_vpn:-:*:*:*:*:*:*:*", "matchCriteriaId": "2CE7D305-2FF3-4003-8127-C2DB68E06AC8", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.10:*:*:*:*:*:*:*", "matchCriteriaId": "55864700-51C8-4540-B4B2-05CE4C7FC245", "vulnerable": false }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r81.20:*:*:*:*:*:*:*", "matchCriteriaId": "3BE80E1E-02E1-44E3-B309-3079F0F5A89C", "vulnerable": false }, { "criteria": "cpe:2.3:o:checkpoint:gaia_os:r82:*:*:*:*:*:*:*", "matchCriteriaId": "6443AE50-1CB5-4D00-8C8D-97DB966687DD", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Authenticated end-user may set a specially crafted SNX bookmark that can make their browser run a script while accessing their own bookmark list." }, { "lang": "es", "value": "El usuario final autenticado puede configurar un marcador SNX especialmente manipulado que puede hacer que su navegador ejecute un script mientras accede a su propia lista de marcadores." } ], "id": "CVE-2024-52887", "lastModified": "2025-09-02T18:37:08.137", "metrics": { "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 3.5, "baseSeverity": "LOW", "confidentialityImpact": "NONE", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.1, "impactScore": 1.4, "source": "cve@checkpoint.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.3, "impactScore": 2.7, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2025-04-27T08:15:14.077", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Vendor Advisory" ], "url": "https://support.checkpoint.com/results/sk/sk183054" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Analyzed", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-79" } ], "source": "cve@checkpoint.com", "type": "Secondary" } ] }
Vulnerability from fkie_nvd
Published
2022-05-11 17:15
Modified
2024-11-21 06:03
Severity ?
Summary
The Check Point Gaia Portal's GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS.
References
▼ | URL | Tags | |
---|---|---|---|
cve@checkpoint.com | https://supportcontent.checkpoint.com/solutions?id=sk179128 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://supportcontent.checkpoint.com/solutions?id=sk179128 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
checkpoint | gaia_portal | * | |
checkpoint | gaia_os | - | |
checkpoint | quantum_security_management | - | |
checkpoint | gaia_os | - | |
checkpoint | quantum_security_gateway | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:gaia_portal:*:*:*:*:*:*:*:*", "matchCriteriaId": "3426C04E-947F-411F-87FA-0BC1316AFE72", "versionEndExcluding": "2022-04-13", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:gaia_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "51E8827B-8B83-487D-A7EE-26F8A0702F1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_security_management:-:*:*:*:*:*:*:*", "matchCriteriaId": "08601413-25E2-4977-B67A-C11A9D788EA8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:checkpoint:gaia_os:-:*:*:*:*:*:*:*", "matchCriteriaId": "51E8827B-8B83-487D-A7EE-26F8A0702F1E", "vulnerable": true } ], "negate": false, "operator": "OR" }, { "cpeMatch": [ { "criteria": "cpe:2.3:h:checkpoint:quantum_security_gateway:-:*:*:*:*:*:*:*", "matchCriteriaId": "9016DDF6-285C-4E64-88D0-29ECCEF048F8", "vulnerable": false } ], "negate": false, "operator": "OR" } ], "operator": "AND" } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The Check Point Gaia Portal\u0027s GUI Clients allowed authenticated administrators with permission for the GUI Clients settings to inject a command that would run on the Gaia OS." }, { "lang": "es", "value": "Los Clientes GUI del Portal Gaia de Check Point permit\u00edan a administradores autenticados con permiso para la configuraci\u00f3n de los Clientes GUI inyectar un comando que ser\u00eda ejecutado en el Sistema Operativo Gaia" } ], "id": "CVE-2021-30361", "lastModified": "2024-11-21T06:03:56.933", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 6.9, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.4, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 6.7, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "HIGH", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 0.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2022-05-11T17:15:08.833", "references": [ { "source": "cve@checkpoint.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk179128" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://supportcontent.checkpoint.com/solutions?id=sk179128" } ], "sourceIdentifier": "cve@checkpoint.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "cve@checkpoint.com", "type": "Secondary" }, { "description": [ { "lang": "en", "value": "CWE-78" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }