Vulnerability Details : CVE-2008-0662
The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials.
Products affected by CVE-2008-0662
- cpe:2.3:a:checkpoint:vpn-1_secureclient:ngai_r56:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:vpn-1_secureclient:ngx_r60:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2008-0662
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 6 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-0662
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST | |
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2024-01-25 |
CWE ids for CVE-2008-0662
-
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.Assigned by: nvd@nist.gov (Primary)
-
The product specifies permissions for a security-critical resource in a way that allows that resource to be read or modified by unintended actors.Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0662
-
http://digihax.com/
HomeNot Applicable
-
http://www.securityfocus.com/bid/27675
Broken Link;Third Party Advisory;VDB Entry
-
http://www.vupen.com/english/advisories/2008/0475
Webmail: access your OVH emails on ovhcloud.com | OVHcloudPermissions Required
-
http://www.securityfocus.com/archive/1/487735/100/0/threaded
Broken Link;Third Party Advisory;VDB Entry
-
https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml
Support, Support Requests, Training, Documentation, and Knowledge base for Check Point products and servicesNot Applicable
-
http://securityreason.com/securityalert/3627
Checkpoint SecuRemote/Secure Client NGX Auto Local Logon Vulnerability - CXSecurity.comBroken Link
-
http://www.securitytracker.com/id?1019317
Broken Link;Third Party Advisory;VDB Entry
-
http://secunia.com/advisories/28820
About Secunia Research | FlexeraBroken Link
Jump to