CVE-2008-0662

The Auto Local Logon feature in Check Point VPN-1 SecuRemote/SecureClient NGX R60 and R56 for Windows caches credentials under the Checkpoint\SecuRemote registry key, which has Everyone/Full Control permissions, which allows local users to gain privileges by reading and reusing the credentials.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:checkpoint:vpn-1_secureclient:ngai_r56:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1_secureclient:ngx_r60:*:*:*:*:*:*:*

History

21 Nov 2024, 00:42

Type Values Removed Values Added
References () http://digihax.com/ - Not Applicable () http://digihax.com/ - Not Applicable
References () http://secunia.com/advisories/28820 - Broken Link () http://secunia.com/advisories/28820 - Broken Link
References () http://securityreason.com/securityalert/3627 - Broken Link () http://securityreason.com/securityalert/3627 - Broken Link
References () http://www.securityfocus.com/archive/1/487735/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/487735/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securityfocus.com/bid/27675 - Broken Link, Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/27675 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.securitytracker.com/id?1019317 - Broken Link, Third Party Advisory, VDB Entry () http://www.securitytracker.com/id?1019317 - Broken Link, Third Party Advisory, VDB Entry
References () http://www.vupen.com/english/advisories/2008/0475 - Permissions Required () http://www.vupen.com/english/advisories/2008/0475 - Permissions Required
References () https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml - Not Applicable () https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml - Not Applicable

25 Jan 2024, 21:31

Type Values Removed Values Added
CVSS v2 : 7.2
v3 : unknown
v2 : 7.2
v3 : 7.8
CWE CWE-200 CWE-732
References (BUGTRAQ) http://www.securityfocus.com/archive/1/487735/100/0/threaded - (BUGTRAQ) http://www.securityfocus.com/archive/1/487735/100/0/threaded - Broken Link, Third Party Advisory, VDB Entry
References (SECTRACK) http://www.securitytracker.com/id?1019317 - (SECTRACK) http://www.securitytracker.com/id?1019317 - Broken Link, Third Party Advisory, VDB Entry
References (CONFIRM) https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml - (CONFIRM) https://usercenter.checkpoint.com/usercenter/portal/user/anon/page/supportCenter.psml - Not Applicable
References (BID) http://www.securityfocus.com/bid/27675 - (BID) http://www.securityfocus.com/bid/27675 - Broken Link, Third Party Advisory, VDB Entry
References (SREASON) http://securityreason.com/securityalert/3627 - (SREASON) http://securityreason.com/securityalert/3627 - Broken Link
References (MISC) http://digihax.com/ - (MISC) http://digihax.com/ - Not Applicable
References (VUPEN) http://www.vupen.com/english/advisories/2008/0475 - (VUPEN) http://www.vupen.com/english/advisories/2008/0475 - Permissions Required
References (SECUNIA) http://secunia.com/advisories/28820 - (SECUNIA) http://secunia.com/advisories/28820 - Broken Link

Information

Published : 2008-02-08 02:00

Updated : 2025-04-09 00:30


NVD link : CVE-2008-0662

Mitre link : CVE-2008-0662

CVE.ORG link : CVE-2008-0662


JSON object : View

Products Affected

checkpoint

  • vpn-1_secureclient
CWE
CWE-732

Incorrect Permission Assignment for Critical Resource