Check Point Gaia Operating System Administrator password truncation (sk155172)

critical Nessus Plugin ID 128149

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The remote host is running a version of the Gaia Operating System which is affected by a vulnerability. Administrators who set their password while firmware R77.20.85, R77.20.86 or R77.20.87 (< Build 990172921) were installed can authenticate to the SMB appliance using only the first 8 characters. This is because administrator passwords which were created or changed while using the affected firmware versions are enforced with a weaker password hash algorithm than previous versions.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Apply the relevant patch and fix referenced in the vendor advisory.

See Also

http://www.nessus.org/u?bc4c9338

Plugin Details

Severity: Critical

ID: 128149

File Name: check_point_gaia_sk155172.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 8/26/2019

Updated: 8/26/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Score based on analysis of effect of the vulnerability.

CVSS v2

Risk Factor: High

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:check_point:gaia_os

Required KB Items: Settings/ParanoidReport, Host/Check_Point/version, Host/Check_Point/model

Patch Publication Date: 5/12/2019

Vulnerability Publication Date: 6/26/2019