Check Point Gaia Operating System Administrator password truncation (sk155172)

critical Nessus Plugin ID 128149
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is missing a vendor-supplied security patch.


The remote host is running a version of the Gaia Operating System which is affected by a vulnerability. Administrators who set their password while firmware R77.20.85, R77.20.86 or R77.20.87 (< Build 990172921) were installed can authenticate to the SMB appliance using only the first 8 characters. This is because administrator passwords which were created or changed while using the affected firmware versions are enforced with a weaker password hash algorithm than previous versions.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Apply the relevant patch and fix referenced in the vendor advisory.

See Also

Plugin Details

Severity: Critical

ID: 128149

File Name: check_point_gaia_sk155172.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 8/26/2019

Updated: 8/26/2019

Dependencies: check_point_gaia_os_version.nbin

Configuration: Enable paranoid mode

Risk Information

CVSS Score Source: manual

CVSS Score Rationale: Score based on analysis of effect of the vulnerability.


Risk Factor: High

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C


Risk Factor: Critical

Base Score: 9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:o:check_point:gaia_os:*:*:*:*:*:*:*:*

Required KB Items: Settings/ParanoidReport, Host/Check_Point/version, Host/Check_Point/model

Patch Publication Date: 5/12/2019

Vulnerability Publication Date: 6/26/2019