Checkpoint » Vpn-1 : Security Vulnerabilities, CVEs, Published In 2009
Check Point VPN-1 R55, R65, and other versions, when Port Address Translation (PAT) is used, allows remote attackers to discover intranet IP addresses via a packet with a small TTL, which triggers an ICMP_TIMXCEED_INTRANS (aka ICMP time exceeded in-transit) response containing an encapsulated IP packet with an intranet address, as demonstrated by a TCP packet to the firewall management server on port 18264.
Max CVSS
5.0
EPSS Score
0.66%
Published
2009-01-06
Updated
2017-08-08
1 vulnerabilities found