var-201404-0291
Vulnerability from variot

Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to "important security fixes.". Founded in 1993, Check Point Software Technologies is headquartered in Redwood City, Calif., and is the world's leading provider of Internet security solutions, leading the global enterprise firewall, personal firewall and virtual private network (VPN) markets. There are multiple vulnerabilities in Check Point's multiple products. There are currently no detailed vulnerability descriptions. The impact of these issues is currently unknown. We will update this BID as more information emerges. The following products are affected: Security Gateway 80 R71.x and R75.20.x 600 Appliance R75.20.x 1100 Appliance R75.20.x. Please keep an eye on the cnnvd website or manufacturer announcements

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201404-0291",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "security gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "r75.20"
      },
      {
        "model": "security gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "r71.00"
      },
      {
        "model": "security gateway",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "checkpoint",
        "version": "r71.45"
      },
      {
        "model": "security gateway",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "check point",
        "version": "r71.x"
      },
      {
        "model": "security gateway",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "check point",
        "version": "1100 the appliance  r75.20.42"
      },
      {
        "model": "security gateway",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "check point",
        "version": "r75.20.x"
      },
      {
        "model": "security gateway",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "check point",
        "version": "80 r71.45 (730159141)"
      },
      {
        "model": "security gateway",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "check point",
        "version": "600 the appliance  r75.20.42"
      },
      {
        "model": "point appliance r75.20 hfa",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "check",
        "version": "60042"
      },
      {
        "model": "point appliance r75.20 hfa",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "check",
        "version": "100042"
      },
      {
        "model": "point security gateway r71.45",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "check",
        "version": "80"
      },
      {
        "model": "point software security gateway r75.20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "check",
        "version": "80"
      },
      {
        "model": "point software security gateway r71.45",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "check",
        "version": "80"
      },
      {
        "model": "point software security gateway r71.00",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "check",
        "version": "80"
      },
      {
        "model": "point software appliance r75.20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "check",
        "version": "600"
      },
      {
        "model": "point software appliance r75.20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "check",
        "version": "1000"
      },
      {
        "model": "point software security gateway r75.20.4",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "check",
        "version": "80"
      },
      {
        "model": "point software security gateway r71.45",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "check",
        "version": "80(730159141)"
      },
      {
        "model": "point software appliance r75.20.42",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "check",
        "version": "600"
      },
      {
        "model": "point software appliance r75.20.42",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "check",
        "version": "1000"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "db": "BID",
        "id": "66598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7350"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:checkpoint:security_gateway",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Reported by the vendor.",
    "sources": [
      {
        "db": "BID",
        "id": "66598"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2013-7350",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2013-7350",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "NONE",
            "baseScore": 5.0,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2014-01251",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-67352",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2013-7350",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2013-7350",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2014-01251",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201404-015",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-67352",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67352"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7350"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple unspecified vulnerabilities in Check Point Security Gateway 80 R71.x before R71.45 (730159141) and R75.20.x before R75.20.4 and 600 and 1100 appliances R75.20.x before R75.20.42 have unknown impact and attack vectors related to \"important security fixes.\". Founded in 1993, Check Point Software Technologies is headquartered in Redwood City, Calif., and is the world\u0027s leading provider of Internet security solutions, leading the global enterprise firewall, personal firewall and virtual private network (VPN) markets. There are multiple vulnerabilities in Check Point\u0027s multiple products. There are currently no detailed vulnerability descriptions. \nThe impact of these issues is currently unknown. We will update this BID  as more information emerges. \nThe following products are affected:\nSecurity Gateway 80 R71.x and R75.20.x\n600 Appliance R75.20.x\n1100 Appliance R75.20.x. Please keep an eye on the cnnvd website or manufacturer announcements",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7350"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "db": "BID",
        "id": "66598"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67352"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2013-7350",
        "trust": 2.8
      },
      {
        "db": "OSVDB",
        "id": "102745",
        "trust": 2.3
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-015",
        "trust": 0.7
      },
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "66598",
        "trust": 0.4
      },
      {
        "db": "VULHUB",
        "id": "VHN-67352",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67352"
      },
      {
        "db": "BID",
        "id": "66598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7350"
      }
    ]
  },
  "id": "VAR-201404-0291",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67352"
      }
    ],
    "trust": 1.7
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "Network device"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:18:37.834000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Security enhancements for 600 / 1100 Appliance and Security Gateway 80",
        "trust": 0.8,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=\u0026solutionid=sk98332\u0026src=securityAlerts"
      },
      {
        "title": "Patch Point multiple patches for multiple vulnerabilities",
        "trust": 0.6,
        "url": "https://www.cnvd.org.cn/patchInfo/show/43858"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-noinfo",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2013-7350"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 1.9,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026solutionid=sk98332\u0026src=securityalerts"
      },
      {
        "trust": 1.7,
        "url": "http://osvdb.org/102745"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2013-7350"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2013-7350"
      },
      {
        "trust": 0.6,
        "url": "http://osvdb.com/show/osvdb/102745"
      },
      {
        "trust": 0.3,
        "url": "http://www.checkpoint.com"
      },
      {
        "trust": 0.1,
        "url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventsubmit_dogoviewsolutiondetails=\u0026amp;solutionid=sk98332\u0026amp;src=securityalerts"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67352"
      },
      {
        "db": "BID",
        "id": "66598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7350"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "db": "VULHUB",
        "id": "VHN-67352"
      },
      {
        "db": "BID",
        "id": "66598"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      },
      {
        "db": "NVD",
        "id": "CVE-2013-7350"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "date": "2014-04-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-67352"
      },
      {
        "date": "2014-04-01T00:00:00",
        "db": "BID",
        "id": "66598"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      },
      {
        "date": "2014-04-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      },
      {
        "date": "2014-04-01T06:35:53.387000",
        "db": "NVD",
        "id": "CVE-2013-7350"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2014-02-26T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2014-01251"
      },
      {
        "date": "2014-04-01T00:00:00",
        "db": "VULHUB",
        "id": "VHN-67352"
      },
      {
        "date": "2014-04-01T00:00:00",
        "db": "BID",
        "id": "66598"
      },
      {
        "date": "2014-04-02T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      },
      {
        "date": "2014-04-03T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      },
      {
        "date": "2024-11-21T02:00:48.637000",
        "db": "NVD",
        "id": "CVE-2013-7350"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Check Point Security Gateway Vulnerability in",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2014-001865"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "lack of information",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201404-015"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…