Search criteria
6 vulnerabilities found for ssl_network_extender by checkpoint
FKIE_CVE-2022-23746
Vulnerability from fkie_nvd - Published: 2022-11-30 19:15 - Updated: 2025-04-25 15:15
Severity ?
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
7.5 (High) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Summary
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.
References
| URL | Tags | ||
|---|---|---|---|
| cve@checkpoint.com | https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk180271 | Mitigation, Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk180271 | Mitigation, Patch, Vendor Advisory |
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:-:*:*:*:-:*:*",
"matchCriteriaId": "BF475471-34D5-4E87-B1D1-DFEB82D62EEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_10:*:*:*:-:*:*",
"matchCriteriaId": "E168D96C-A5B3-4878-8804-9E286A211262",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_103:*:*:*:-:*:*",
"matchCriteriaId": "20CAECDF-7269-41AF-99BE-A4627D9466BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_117:*:*:*:-:*:*",
"matchCriteriaId": "991A8F2A-D4BD-40A5-A0F1-B5FAD4A6857A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_118:*:*:*:-:*:*",
"matchCriteriaId": "953D4AD0-9E77-487C-876C-04E93E0E5841",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_127:*:*:*:-:*:*",
"matchCriteriaId": "D1789F80-1D3B-4DA3-8AB6-AF6FC50ACFE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_134:*:*:*:-:*:*",
"matchCriteriaId": "FB3C3DAF-DE4A-4E95-974F-9B099F376458",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_135:*:*:*:-:*:*",
"matchCriteriaId": "CAEFF282-731B-4A46-9D89-AD70D382EFD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_138:*:*:*:-:*:*",
"matchCriteriaId": "EBD5608F-C9E6-4CB9-B4F2-DE973D839DF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_141:*:*:*:-:*:*",
"matchCriteriaId": "869B1669-B516-4930-8435-956FB46E58F2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_149:*:*:*:-:*:*",
"matchCriteriaId": "27C8365D-2D4B-463A-A251-F7CE93B527B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_155:*:*:*:-:*:*",
"matchCriteriaId": "BE4B6E4E-DF5D-4953-AD50-E7BE62106BD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_156:*:*:*:-:*:*",
"matchCriteriaId": "D6781C55-0793-478A-841B-5743DEB156C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_160:*:*:*:-:*:*",
"matchCriteriaId": "78883917-B672-4078-9620-290422FF9116",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_161:*:*:*:-:*:*",
"matchCriteriaId": "889F1DE2-B15D-4F84-8A7A-A14D22B53EF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_17:*:*:*:-:*:*",
"matchCriteriaId": "5D948A9D-D50C-4F6D-AEE4-A021E431E0D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_173:*:*:*:-:*:*",
"matchCriteriaId": "1F67BC9A-D90C-46FA-A754-100BE62BB38A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_183:*:*:*:-:*:*",
"matchCriteriaId": "39A43AAC-375B-442F-A8DD-FE58A4FD2EEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_187:*:*:*:-:*:*",
"matchCriteriaId": "8C15843A-8B8B-4197-A0F8-FB9E961368D4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_188:*:*:*:-:*:*",
"matchCriteriaId": "0D842367-664D-4053-BB81-1143B84EAE40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_190:*:*:*:-:*:*",
"matchCriteriaId": "770CAB4B-D3F5-4EA9-B956-96559AA2C2C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_202:*:*:*:-:*:*",
"matchCriteriaId": "0BCF8274-7197-49C2-A4E7-F4058E3D99AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_203:*:*:*:-:*:*",
"matchCriteriaId": "765873E2-2755-4CD4-BA8F-01C695E93F81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_205:*:*:*:-:*:*",
"matchCriteriaId": "99F377BB-86B9-42F1-9728-CDD29E42F880",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_208:*:*:*:-:*:*",
"matchCriteriaId": "8B23B447-C746-4492-A3A6-8BD120BC910F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_210:*:*:*:-:*:*",
"matchCriteriaId": "160E0D83-BAC4-442A-A489-1CF483C1ACB1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_211:*:*:*:-:*:*",
"matchCriteriaId": "2FB4121F-2133-4D5E-B85D-E32C51842FB3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_220:*:*:*:-:*:*",
"matchCriteriaId": "A1401C74-5039-4E21-B291-C2BD38D79872",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_33:*:*:*:-:*:*",
"matchCriteriaId": "4DDCAC68-7467-4E4E-A8FD-5F0FEF8B146F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_42:*:*:*:-:*:*",
"matchCriteriaId": "6E057B9D-4544-4360-AAB8-7E06CAC2FF91",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_47:*:*:*:-:*:*",
"matchCriteriaId": "B0B84A3E-05AF-42D5-A15F-FB42E406A7DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_73:*:*:*:-:*:*",
"matchCriteriaId": "1DC2F3CF-80AF-4E74-B06A-0DF8B9B8216C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_74:*:*:*:-:*:*",
"matchCriteriaId": "B7D09779-E610-4AAB-8491-A9F4D096EC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_80:*:*:*:-:*:*",
"matchCriteriaId": "77B63902-E503-49A6-96DE-EFE4058800DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_87:*:*:*:-:*:*",
"matchCriteriaId": "8DE439EA-31F5-444A-9A48-06402695C7F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_91:*:*:*:-:*:*",
"matchCriteriaId": "A6DE692D-71EB-40C0-B989-D3750D61839B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:-:*:*:*:-:*:*",
"matchCriteriaId": "E03F234F-36CC-4E19-A0BA-ED62E65C7F25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_105:*:*:*:-:*:*",
"matchCriteriaId": "F9DE99B1-431B-4D90-A09E-B143496680DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_121:*:*:*:-:*:*",
"matchCriteriaId": "20605A31-E17A-40B1-A534-71F20C136C97",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_163:*:*:*:-:*:*",
"matchCriteriaId": "D2AA91E0-C75C-443A-A711-05F262EE95D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_178:*:*:*:-:*:*",
"matchCriteriaId": "B6F8FCB6-5EB2-41F2-A0FF-C67434CBB12B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_191:*:*:*:-:*:*",
"matchCriteriaId": "5DBAA131-AEE3-4AF0-8490-641B1681C910",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_210:*:*:*:-:*:*",
"matchCriteriaId": "FD879EF1-0EC4-4ABB-B653-9F80C1865775",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_240:*:*:*:-:*:*",
"matchCriteriaId": "FB235F89-9C6C-4666-B08A-BC3C2EA8198F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_258:*:*:*:-:*:*",
"matchCriteriaId": "CE070DA8-F343-4D50-A464-218F2805A0DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_266:*:*:*:-:*:*",
"matchCriteriaId": "01A88E95-A5DA-4B1F-807D-9F2E00A90D61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_273:*:*:*:-:*:*",
"matchCriteriaId": "59A4EBF3-4E69-49C7-B944-14644D5CBE17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_279:*:*:*:-:*:*",
"matchCriteriaId": "160F0C3F-B0E9-4BD8-BF39-697ED341BCF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_283:*:*:*:-:*:*",
"matchCriteriaId": "CC74B2EE-B66F-4F6B-8023-97D1883FD332",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_295:*:*:*:-:*:*",
"matchCriteriaId": "E3E35515-F47B-4800-B22F-CF3CEF7057C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_302:*:*:*:-:*:*",
"matchCriteriaId": "D6BC22BA-8F4F-49B2-A229-CB7153DF3C84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_304:*:*:*:-:*:*",
"matchCriteriaId": "DCD1EDF2-6124-47DE-A980-0963E33E9CAD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_305:*:*:*:-:*:*",
"matchCriteriaId": "BA91F611-E146-482C-9914-7543B872F0AE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_306:*:*:*:-:*:*",
"matchCriteriaId": "84AD6327-DF11-4765-9B25-C511C82E8CEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_309:*:*:*:-:*:*",
"matchCriteriaId": "35DCF634-8EA2-4368-9005-0989E9B7CB61",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_310:*:*:*:-:*:*",
"matchCriteriaId": "23794586-8C77-445A-A9EB-AF9A72A8E133",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_313:*:*:*:-:*:*",
"matchCriteriaId": "C79EE759-ED4A-4492-9F76-6FD9FB1BA96D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_314:*:*:*:-:*:*",
"matchCriteriaId": "C3CACD7D-9980-46FF-88A6-28C8C6ACFB1A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_315:*:*:*:-:*:*",
"matchCriteriaId": "25710BD1-DA36-4C54-8A7E-9C377CD9CEE3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_317:*:*:*:-:*:*",
"matchCriteriaId": "25F2A39B-C412-4352-8E79-44F012501F56",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_326:*:*:*:-:*:*",
"matchCriteriaId": "7982F23D-15F2-4F9E-85E2-DECB245EF686",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_327:*:*:*:-:*:*",
"matchCriteriaId": "2F5BB97F-3A07-4782-98AA-866C2C04C57E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_331:*:*:*:-:*:*",
"matchCriteriaId": "9F4E8EAA-683A-4E26-B0C6-841682CE8B3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_332:*:*:*:-:*:*",
"matchCriteriaId": "6948A166-2EA7-4E22-89F0-DCD486A2BC5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_334:*:*:*:-:*:*",
"matchCriteriaId": "579EEBAC-04DB-4F93-8A62-E305713844FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_335:*:*:*:-:*:*",
"matchCriteriaId": "D2A529EC-1086-482C-A064-0DA99035F5D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:-:*:*:*:-:*:*",
"matchCriteriaId": "F9987780-9758-4CDC-A6B8-993BB2702A35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_107:*:*:*:-:*:*",
"matchCriteriaId": "76BB3A2A-487B-43BB-BAC8-755BE7436851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_111:*:*:*:-:*:*",
"matchCriteriaId": "509CD749-D385-4E21-BF05-541FCE253184",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_135:*:*:*:-:*:*",
"matchCriteriaId": "68B07FB6-F8FC-4AC3-A612-76221CCE5CF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_136:*:*:*:-:*:*",
"matchCriteriaId": "AB7C878A-3509-48FC-BFEF-7A2659C90C8D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_140:*:*:*:-:*:*",
"matchCriteriaId": "C0990E9D-1943-46E3-9871-0806DB94B1DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_155:*:*:*:-:*:*",
"matchCriteriaId": "ACAC6D16-C6D1-40DC-95A2-208B6C73F7FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_163:*:*:*:-:*:*",
"matchCriteriaId": "638AEED4-D21C-40B0-BF94-DA02BE01B89D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_166:*:*:*:-:*:*",
"matchCriteriaId": "3AE665C9-7170-4C7A-8DE3-C91025D93E1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_168:*:*:*:-:*:*",
"matchCriteriaId": "5AD71018-CF6E-4BFF-882A-3410672EF23C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_180:*:*:*:-:*:*",
"matchCriteriaId": "31906D36-0213-486D-A85E-7CE4F98548A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_19:*:*:*:-:*:*",
"matchCriteriaId": "844C0179-D552-476B-9A6A-E13457952689",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_191:*:*:*:-:*:*",
"matchCriteriaId": "8C710CF5-69D5-4A24-8F4F-0D10F4CB963A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_195:*:*:*:-:*:*",
"matchCriteriaId": "3CC9E8BD-5FF1-4F46-931C-9E998612CE8E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_196:*:*:*:-:*:*",
"matchCriteriaId": "9308A2B2-2B6B-4663-9C5C-DFFD7A822360",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_210:*:*:*:-:*:*",
"matchCriteriaId": "395FC19E-8A72-4332-99CE-6A248559DE36",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_213:*:*:*:-:*:*",
"matchCriteriaId": "34690B1C-AC27-413C-840A-C37500B0AA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_214:*:*:*:-:*:*",
"matchCriteriaId": "17FA208D-2491-40A1-9A2A-22A4CE0577EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_215:*:*:*:-:*:*",
"matchCriteriaId": "E712C742-0D3B-4042-9F99-FBF7272F6D42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_217:*:*:*:-:*:*",
"matchCriteriaId": "6B02DA0E-8BCD-4BEB-8870-35395E03EE9D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_219:*:*:*:-:*:*",
"matchCriteriaId": "FF3A78AF-F1BF-40E2-AE08-6DEEDED15D04",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_221:*:*:*:-:*:*",
"matchCriteriaId": "89730F0B-2396-409A-88A5-4AD274B6A42C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_226:*:*:*:-:*:*",
"matchCriteriaId": "C7A9F0D6-C77B-402E-98B8-7F8734A457F3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_227:*:*:*:-:*:*",
"matchCriteriaId": "2244C2EF-4719-4C0C-8656-A756A60820FF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_228:*:*:*:-:*:*",
"matchCriteriaId": "6D452616-76EC-4BFA-A7EE-9A42A9F4B491",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_232:*:*:*:-:*:*",
"matchCriteriaId": "19F16860-A8D9-4DAF-9593-01EF1999AA5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_235:*:*:*:-:*:*",
"matchCriteriaId": "547BA41F-2A9B-4C52-9E52-FE865CB7A74C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_236:*:*:*:-:*:*",
"matchCriteriaId": "74AD1AB1-BD9F-43E7-A0BB-001AB1601A6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_237:*:*:*:-:*:*",
"matchCriteriaId": "84CCE18A-AA7E-40C2-A3C5-973C79AAFD58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_241:*:*:*:-:*:*",
"matchCriteriaId": "1289963A-3A00-4512-89DE-C3454BC91ABF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_242:*:*:*:-:*:*",
"matchCriteriaId": "2152BDB3-D449-41EE-88D6-B8835740CB05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_245:*:*:*:-:*:*",
"matchCriteriaId": "DA37239A-2BEB-4C01-B142-8BBC67959EC3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_246:*:*:*:-:*:*",
"matchCriteriaId": "5C2056F5-5C35-476A-A1AC-7604DFE99CDB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_251:*:*:*:-:*:*",
"matchCriteriaId": "5E6D966D-FD74-4230-837D-68E085089AEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_254:*:*:*:-:*:*",
"matchCriteriaId": "E6DF104D-D03F-4D70-A657-ED9F8D1D7B6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_50:*:*:*:-:*:*",
"matchCriteriaId": "7264B271-85E4-45BA-A894-8E767253B14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_76:*:*:*:-:*:*",
"matchCriteriaId": "92987D61-4EBA-423E-8AA0-EBEE8AB59F38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:-:*:*:*:-:*:*",
"matchCriteriaId": "CA516F2A-428C-42C1-BE3A-E7B14FA662FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_101:*:*:*:-:*:*",
"matchCriteriaId": "34FD9363-B3D0-424D-B798-9362329BAD67",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_31:*:*:*:-:*:*",
"matchCriteriaId": "13E46551-EAA1-4A2D-93C8-47525B090DED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_32:*:*:*:-:*:*",
"matchCriteriaId": "D5B9E4E3-8F8E-4136-8323-9850F5074D47",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_45:*:*:*:-:*:*",
"matchCriteriaId": "A25FE4AD-6D40-4CF9-A128-F3B914B563FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_49:*:*:*:-:*:*",
"matchCriteriaId": "F0E09B58-A53F-442F-B116-F0C457AB54A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_56:*:*:*:-:*:*",
"matchCriteriaId": "34142CA2-861C-458A-BFD1-6FE1FEABE1BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_73:*:*:*:-:*:*",
"matchCriteriaId": "7668BB5A-0122-4EC1-96C8-6188474CB387",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_75:*:*:*:-:*:*",
"matchCriteriaId": "AC58A89F-E5B3-42D8-BD48-2D9ABC159FF1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_82:*:*:*:-:*:*",
"matchCriteriaId": "DAE4932E-005D-4544-904D-70084CA927A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_97:*:*:*:-:*:*",
"matchCriteriaId": "ADFFCE01-9396-4965-BBC9-D41C56B344E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:-:*:*:*:-:*:*",
"matchCriteriaId": "9062967B-D13A-451A-B4E9-13E1F293E205",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_100:*:*:*:-:*:*",
"matchCriteriaId": "4016651D-BB64-40C2-998B-6BF04AE22D20",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_102:*:*:*:-:*:*",
"matchCriteriaId": "D1C95265-27AA-49BC-AE70-B836B5D750D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_114:*:*:*:-:*:*",
"matchCriteriaId": "EF0F3C88-DEBD-4EE3-AC40-E099363394BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_118:*:*:*:-:*:*",
"matchCriteriaId": "A38A56E1-F5A0-47D5-8D70-9E176863C243",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_119:*:*:*:-:*:*",
"matchCriteriaId": "5EC41226-4AB4-4E56-AAA0-F8CFF0EC69DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_120:*:*:*:-:*:*",
"matchCriteriaId": "561EA56B-8FA7-434C-A5A6-4C9BBD5DCC0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_121:*:*:*:-:*:*",
"matchCriteriaId": "12D7E14B-DE91-4C1D-BEB2-B61ABC7DEEFA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_125:*:*:*:-:*:*",
"matchCriteriaId": "5D2585BD-0B52-47B1-B44B-310EFAB2C1D0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_126:*:*:*:-:*:*",
"matchCriteriaId": "75965285-4CB8-489F-8A8F-FE47EC39FCF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_131:*:*:*:-:*:*",
"matchCriteriaId": "E3EB4E97-B416-47E4-8871-0D018A15C4E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_138:*:*:*:-:*:*",
"matchCriteriaId": "9F9AB005-94FE-407F-A683-414EEAC82ABA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_139:*:*:*:-:*:*",
"matchCriteriaId": "AEB7E6E1-6646-4D5B-8C11-DA24DF6440E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_150:*:*:*:-:*:*",
"matchCriteriaId": "9626F5DE-9FFA-41F9-AFC5-22D15D22BF02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_153:*:*:*:-:*:*",
"matchCriteriaId": "6BB8B3DF-098B-45CD-8B0B-3F1A46431528",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_154:*:*:*:-:*:*",
"matchCriteriaId": "783FDC00-4F51-4E4A-8A95-9D63B3D63CE8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_156:*:*:*:-:*:*",
"matchCriteriaId": "EAC41E60-969D-43B2-A970-87CCC9051E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_158:*:*:*:-:*:*",
"matchCriteriaId": "9F58DF23-2C35-480A-B735-FA117E1CDD60",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_161:*:*:*:-:*:*",
"matchCriteriaId": "7E366985-FEF4-4ACB-982E-AFFFD44D0510",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_172:*:*:*:-:*:*",
"matchCriteriaId": "130FB0B6-AC94-4AF6-B2B0-B9A1AE8C06B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_173:*:*:*:-:*:*",
"matchCriteriaId": "58F6C2AA-B43F-48DF-B2C6-6B2C319CE890",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_25:*:*:*:-:*:*",
"matchCriteriaId": "88152EA3-FDCA-4387-B053-01E806F08040",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_38:*:*:*:-:*:*",
"matchCriteriaId": "95C25D41-3C63-4BF9-ACED-027AECDDEC27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_45:*:*:*:-:*:*",
"matchCriteriaId": "680614B8-81E8-4B34-9F81-F1861358E1AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_48:*:*:*:-:*:*",
"matchCriteriaId": "8BA01E5D-82DE-4F93-9A88-8363FC060A5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_53:*:*:*:-:*:*",
"matchCriteriaId": "E975B05F-ED09-4354-9993-32DB47C35432",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_54:*:*:*:-:*:*",
"matchCriteriaId": "5FCBDC15-0D1F-4A6D-90BB-D6A445BEF994",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_55:*:*:*:-:*:*",
"matchCriteriaId": "B1C21331-C61D-433F-80C5-C4E31CF1CCDF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_65:*:*:*:-:*:*",
"matchCriteriaId": "754A405D-2ED9-4AB2-AB8E-58B316A8FDDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_67:*:*:*:-:*:*",
"matchCriteriaId": "947F18B7-5E56-45B0-903B-374A75E02E08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_69:*:*:*:-:*:*",
"matchCriteriaId": "418A09D7-E62F-462F-A95E-E2C6ADA4B5E7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_74:*:*:*:-:*:*",
"matchCriteriaId": "BC23D289-88D6-4876-BEF3-5CF51BE3963C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_77:*:*:*:-:*:*",
"matchCriteriaId": "427C6BA3-DC39-4370-92E4-9AD3BC0CA7D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_78:*:*:*:-:*:*",
"matchCriteriaId": "2DAA20D7-C5B1-4101-B9CA-E545F0A9EA45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_83:*:*:*:-:*:*",
"matchCriteriaId": "0A4A12C6-F825-47E3-A76D-6B6F035DD80D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_87:*:*:*:-:*:*",
"matchCriteriaId": "436AADEC-E253-44C1-8EF3-ED4505D8C14A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_89:*:*:*:-:*:*",
"matchCriteriaId": "79C0E256-CD6D-4E7B-ACD6-667FA9815653",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_91:*:*:*:-:*:*",
"matchCriteriaId": "2E636977-E705-437F-B3C1-A317743EA9DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_92:*:*:*:-:*:*",
"matchCriteriaId": "BE1CE1DD-FBCB-4AF3-A1A2-656A04FD6F02",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_93:*:*:*:-:*:*",
"matchCriteriaId": "76E1AF5A-D4C8-4C3D-AB53-A77AF90FF33E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_94:*:*:*:-:*:*",
"matchCriteriaId": "76254DC1-DC81-415F-BCCA-B205EF6F7ABA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:-:*:*:*:-:*:*",
"matchCriteriaId": "3A254271-F8C6-4B0F-A023-A82C5B162643",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_10:*:*:*:-:*:*",
"matchCriteriaId": "B2BCA5CE-9466-4913-B580-2D8AA6E9FEBD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_11:*:*:*:-:*:*",
"matchCriteriaId": "76142089-E244-4669-876D-657D50C738FE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_13:*:*:*:-:*:*",
"matchCriteriaId": "3F3E4CC0-1674-4EE9-A854-2AAE740C9477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_17:*:*:*:-:*:*",
"matchCriteriaId": "2BAD20E2-AC65-48F6-A264-3B50BDFCFA83",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_23:*:*:*:-:*:*",
"matchCriteriaId": "C88220E5-C08B-463C-ACAC-73246CE214CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_25:*:*:*:-:*:*",
"matchCriteriaId": "3E9437F7-F91C-4269-959A-B8CB4CB99B23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_27:*:*:*:-:*:*",
"matchCriteriaId": "228C5DD4-054E-481D-9758-AA0C98690193",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_29:*:*:*:-:*:*",
"matchCriteriaId": "53B28689-8188-4426-A8EC-52B8FB2D945B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_34:*:*:*:-:*:*",
"matchCriteriaId": "CDD85AA9-1895-41C5-87EF-735A71EB8FC6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_36:*:*:*:-:*:*",
"matchCriteriaId": "AF7C43C8-AA95-4E84-8ED3-76B7719B2161",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_42:*:*:*:-:*:*",
"matchCriteriaId": "F1A2758F-9396-438E-BDC4-BF4382855AC9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_44:*:*:*:-:*:*",
"matchCriteriaId": "B8AB9CB5-4DD7-4172-993E-E26B6DCF118C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_51:*:*:*:-:*:*",
"matchCriteriaId": "4DE32E3B-1902-4973-8DD7-463C45DD8A55",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_56:*:*:*:-:*:*",
"matchCriteriaId": "04380D2F-C599-4DE8-B365-E721B646D2B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_58:*:*:*:-:*:*",
"matchCriteriaId": "B3BB4009-CFBB-43A4-90A3-F35EB17DA290",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_60:*:*:*:-:*:*",
"matchCriteriaId": "9438992D-2A4A-464F-8654-09B9B08383CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_65:*:*:*:-:*:*",
"matchCriteriaId": "B15656BC-B05F-46E1-BD96-E2650452A481",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_68:*:*:*:-:*:*",
"matchCriteriaId": "EA4BA5A3-8CD2-4883-BB4B-C514C94D932B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_69:*:*:*:-:*:*",
"matchCriteriaId": "10A18DCE-AAF4-4F3A-B423-F0F16596FAB2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_72:*:*:*:-:*:*",
"matchCriteriaId": "38EAC90F-3B64-4967-A293-D9B2A47A8614",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_74:*:*:*:-:*:*",
"matchCriteriaId": "71799CFE-7028-4AA7-975E-8F3812D12D1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:-:*:*:*:-:*:*",
"matchCriteriaId": "0FD93760-80F0-42AB-8F59-1E7F4BEA8057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_14:*:*:*:-:*:*",
"matchCriteriaId": "15668FEE-FA6B-4567-A20F-1D316370FAF0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_22:*:*:*:-:*:*",
"matchCriteriaId": "0B8878E8-5BB7-4B71-BD05-813128DE2DA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_30:*:*:*:-:*:*",
"matchCriteriaId": "A7211924-32E5-49BD-88E2-E54020A1002C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_38:*:*:*:-:*:*",
"matchCriteriaId": "3A8C195C-8155-4CC0-AEE3-B9B1BA5E5A2E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_44:*:*:*:-:*:*",
"matchCriteriaId": "73CA31BC-977C-40B7-ACFE-DBF4186FEB0B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_45:*:*:*:-:*:*",
"matchCriteriaId": "432ACE03-4F27-428E-B382-7072F941CD4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_55:*:*:*:-:*:*",
"matchCriteriaId": "5695E681-839C-41BD-91CA-0258E0C5770B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_61:*:*:*:-:*:*",
"matchCriteriaId": "505BF65D-ED0C-446E-B58D-29CF0F6E4908",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_66:*:*:*:-:*:*",
"matchCriteriaId": "F58FBFE6-3696-437B-94C1-A8F5542F9F5E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_75:*:*:*:-:*:*",
"matchCriteriaId": "7A043552-60B4-48AE-94B0-6BF5DFF06504",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_78:*:*:*:-:*:*",
"matchCriteriaId": "ECD280B7-F94D-489F-8F98-D78BC8229B37",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_9:*:*:*:-:*:*",
"matchCriteriaId": "F2FF5C18-28AC-4D01-83E1-E27DDB96ABA8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords."
},
{
"lang": "es",
"value": "La IPsec VPN blade tiene un portal dedicado para descargar y conectarse a trav\u00e9s de SSL Network Extender (SNX). Si el portal est\u00e1 configurado para autenticaci\u00f3n de nombre de usuario/contrase\u00f1a, es vulnerable a un ataque de fuerza bruta a nombres de usuario y contrase\u00f1as."
}
],
"id": "CVE-2022-23746",
"lastModified": "2025-04-25T15:15:30.380",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 3.6,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2022-11-30T19:15:10.310",
"references": [
{
"source": "cve@checkpoint.com",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk180271"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Mitigation",
"Patch",
"Vendor Advisory"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk180271"
}
],
"sourceIdentifier": "cve@checkpoint.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "cve@checkpoint.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-307"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
FKIE_CVE-2021-30357
Vulnerability from fkie_nvd - Published: 2021-06-08 14:15 - Updated: 2024-11-21 06:03
Severity ?
Summary
SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| checkpoint | ssl_network_extender | r80.10 | |
| checkpoint | ssl_network_extender | r80.20 | |
| checkpoint | ssl_network_extender | r80.30 | |
| checkpoint | ssl_network_extender | r80.40 | |
| checkpoint | ssl_network_extender | r81 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.10:*:*:*:*:linux:*:*",
"matchCriteriaId": "424ECFFC-D92E-4040-AAD9-5A18ADAFE4B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:*:*:*:*:linux:*:*",
"matchCriteriaId": "6E36C9C4-C1FF-44E4-9177-467EAD0983D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:*:*:*:*:linux:*:*",
"matchCriteriaId": "726962E0-DF4B-4450-BF2F-F414A382CA78",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:*:*:*:*:linux:*:*",
"matchCriteriaId": "35346EB4-FDEC-4496-A90F-95EB35FA1532",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:*:*:*:*:linux:*:*",
"matchCriteriaId": "35E08CA8-803F-460D-BB1B-57FEC4DA10CF",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access."
},
{
"lang": "es",
"value": "SSL Network Extender Client para Linux versiones build anteriores a 800008302, revela parte del contenido del archivo de configuraci\u00f3n suministrado, lo que permite divulgar parcialmente archivos a los que el usuario no ten\u00eda acceso"
}
],
"id": "CVE-2021-30357",
"lastModified": "2024-11-21T06:03:56.467",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 5.0,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 5.3,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 1.4,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2021-06-08T14:15:07.973",
"references": [
{
"source": "cve@checkpoint.com",
"tags": [
"Vendor Advisory"
],
"url": "https://supportcontent.checkpoint.com/solutions?id=sk173513"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://supportcontent.checkpoint.com/solutions?id=sk173513"
}
],
"sourceIdentifier": "cve@checkpoint.com",
"vulnStatus": "Modified",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-209"
}
],
"source": "cve@checkpoint.com",
"type": "Secondary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-209"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
CVE-2022-23746 (GCVE-0-2022-23746)
Vulnerability from cvelistv5 – Published: 2022-11-30 00:00 – Updated: 2025-04-25 14:31
VLAI?
Summary
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.
Severity ?
7.5 (High)
CWE
- CWE-307 - Improper Restriction of Excessive Authentication Attempts
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Gateway & Management, IPsec VPN blade SNX portal. |
Affected:
R81.10 before take 79, R81 before take 77, R80.40 before take 180, R80.30 before take 255, R80.20 before 230
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:51:45.988Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk180271"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-23746",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-25T14:31:35.502955Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-25T14:31:53.350Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Gateway \u0026 Management, IPsec VPN blade SNX portal.",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "R81.10 before take 79, R81 before take 77, R80.40 before take 180, R80.30 before take 255, R80.20 before 230"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307: Improper Restriction of Excessive Authentication Attempts",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-01T00:00:00.000Z",
"orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
"shortName": "checkpoint"
},
"references": [
{
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk180271"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
"assignerShortName": "checkpoint",
"cveId": "CVE-2022-23746",
"datePublished": "2022-11-30T00:00:00.000Z",
"dateReserved": "2022-01-19T00:00:00.000Z",
"dateUpdated": "2025-04-25T14:31:53.350Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-30357 (GCVE-0-2021-30357)
Vulnerability from cvelistv5 – Published: 2021-06-08 13:31 – Updated: 2024-08-03 22:32
VLAI?
Summary
SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access.
Severity ?
No CVSS data available.
CWE
- CWE-209 - Generation of Error Message Containing Sensitive Information
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | SSL Network Extender Client for Linux |
Affected:
before build 800008302
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:32:40.631Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://supportcontent.checkpoint.com/solutions?id=sk173513"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SSL Network Extender Client for Linux",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before build 800008302"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-209",
"description": "CWE-209: Generation of Error Message Containing Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-08T13:31:53",
"orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
"shortName": "checkpoint"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://supportcontent.checkpoint.com/solutions?id=sk173513"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@checkpoint.com",
"ID": "CVE-2021-30357",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SSL Network Extender Client for Linux",
"version": {
"version_data": [
{
"version_value": "before build 800008302"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-209: Generation of Error Message Containing Sensitive Information"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://supportcontent.checkpoint.com/solutions?id=sk173513",
"refsource": "MISC",
"url": "https://supportcontent.checkpoint.com/solutions?id=sk173513"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
"assignerShortName": "checkpoint",
"cveId": "CVE-2021-30357",
"datePublished": "2021-06-08T13:31:53",
"dateReserved": "2021-04-07T00:00:00",
"dateUpdated": "2024-08-03T22:32:40.631Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2022-23746 (GCVE-0-2022-23746)
Vulnerability from nvd – Published: 2022-11-30 00:00 – Updated: 2025-04-25 14:31
VLAI?
Summary
The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords.
Severity ?
7.5 (High)
CWE
- CWE-307 - Improper Restriction of Excessive Authentication Attempts
Assigner
References
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | Gateway & Management, IPsec VPN blade SNX portal. |
Affected:
R81.10 before take 79, R81 before take 77, R80.40 before take 180, R80.30 before take 255, R80.20 before 230
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T03:51:45.988Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk180271"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 7.5,
"baseSeverity": "HIGH",
"confidentialityImpact": "HIGH",
"integrityImpact": "NONE",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2022-23746",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-04-25T14:31:35.502955Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-04-25T14:31:53.350Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "Gateway \u0026 Management, IPsec VPN blade SNX portal.",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "R81.10 before take 79, R81 before take 77, R80.40 before take 180, R80.30 before take 255, R80.20 before 230"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-307",
"description": "CWE-307: Improper Restriction of Excessive Authentication Attempts",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2022-12-01T00:00:00.000Z",
"orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
"shortName": "checkpoint"
},
"references": [
{
"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk180271"
}
]
}
},
"cveMetadata": {
"assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
"assignerShortName": "checkpoint",
"cveId": "CVE-2022-23746",
"datePublished": "2022-11-30T00:00:00.000Z",
"dateReserved": "2022-01-19T00:00:00.000Z",
"dateUpdated": "2025-04-25T14:31:53.350Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
CVE-2021-30357 (GCVE-0-2021-30357)
Vulnerability from nvd – Published: 2021-06-08 13:31 – Updated: 2024-08-03 22:32
VLAI?
Summary
SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access.
Severity ?
No CVSS data available.
CWE
- CWE-209 - Generation of Error Message Containing Sensitive Information
Assigner
References
| URL | Tags | ||||
|---|---|---|---|---|---|
|
|||||
Impacted products
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | SSL Network Extender Client for Linux |
Affected:
before build 800008302
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-03T22:32:40.631Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://supportcontent.checkpoint.com/solutions?id=sk173513"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "SSL Network Extender Client for Linux",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "before build 800008302"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access."
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-209",
"description": "CWE-209: Generation of Error Message Containing Sensitive Information",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2021-06-08T13:31:53",
"orgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
"shortName": "checkpoint"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://supportcontent.checkpoint.com/solutions?id=sk173513"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@checkpoint.com",
"ID": "CVE-2021-30357",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "SSL Network Extender Client for Linux",
"version": {
"version_data": [
{
"version_value": "before build 800008302"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "SSL Network Extender Client for Linux before build 800008302 reveals part of the contents of the configuration file supplied, which allows partially disclosing files to which the user did not have access."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "CWE-209: Generation of Error Message Containing Sensitive Information"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://supportcontent.checkpoint.com/solutions?id=sk173513",
"refsource": "MISC",
"url": "https://supportcontent.checkpoint.com/solutions?id=sk173513"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "897c38be-0345-43cd-b6cf-fe179e0c4f45",
"assignerShortName": "checkpoint",
"cveId": "CVE-2021-30357",
"datePublished": "2021-06-08T13:31:53",
"dateReserved": "2021-04-07T00:00:00",
"dateUpdated": "2024-08-03T22:32:40.631Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}