Check Point Gaia Operating System Administrator password truncation (sk155172)

High Nessus Plugin ID 128149

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The remote host is running a version of the Gaia Operating System which is affected by a vulnerability. Administrators who set their password while firmware R77.20.85, R77.20.86 or R77.20.87 (< Build 990172921) were installed can authenticate to the SMB appliance using only the first 8 characters. This is because administrator passwords which were created or changed while using the affected firmware versions are enforced with a weaker password hash algorithm than previous versions.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Apply the relevant patch and fix referenced in the vendor advisory.

See Also

http://www.nessus.org/u?bc4c9338

Plugin Details

Severity: High

ID: 128149

File Name: check_point_gaia_sk155172.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 2019/08/26

Updated: 2019/08/26

Dependencies: 104670

Configuration: Enable paranoid mode

Risk Information

Risk Factor: High

CVSS Score Source: manual

CVSS Score Rationale: Score based on analysis of effect of the vulnerability.

CVSS v2.0

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:check_point:gaia_os

Required KB Items: Host/Check_Point/version, Host/Check_Point/model, Settings/ParanoidReport

Patch Publication Date: 2019/05/12

Vulnerability Publication Date: 2019/06/26