Vulnerability Assessment & Network Security Forums
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.
Vulnerability Assessment Details
Checkpoint SecuRemote information leakage
Detailed Explanation for this Vulnerability Assessment
The remote host seems to be a Checkpoint FireWall-1 running SecuRemote.
The SecuRemote service contains a vulnerability that permits attackers
to gain information about the hosts, networks, and users configured on
This will enable attackers to focus their attack strategy.
You should not let this information leak out.
Either block the SecuRemote's ports (TCP 256 and 264) to untrusted networks,
or upgrade to the latest version of Checkpoint's Firewall-1.
You could restrict the topology download, so that only authenticated
users can download it.
Go to Policy Properties Desktop Security of your Policy Editor and
uncheck 'respond to unauthenticated topology requests'.
After installing the Policy only authenticated Users can download
Network Security Threat Level: Medium
Reference : http://online.securityfocus.com/archive/1/197566
For More Information:
Networks Security ID: 3058
Vulnerability Assessment Copyright: This script is Copyright (C) 2001 SecuriTeam
No Discussions have been posted on this vulnerability.