Check Point Gaia Operating System Administrator password truncation (sk155172)

high Nessus Plugin ID 128149


The remote host is missing a vendor-supplied security patch.


The remote host is running a version of the Gaia Operating System which is affected by a vulnerability. Administrators who set their password while firmware R77.20.85, R77.20.86 or R77.20.87 (< Build 990172921) were installed can authenticate to the SMB appliance using only the first 8 characters. This is because administrator passwords which were created or changed while using the affected firmware versions are enforced with a weaker password hash algorithm than previous versions.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Apply the relevant patch and fix referenced in the vendor advisory.

See Also

Plugin Details

Severity: High

ID: 128149

File Name: check_point_gaia_sk155172.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 8/26/2019

Updated: 8/26/2019

Dependencies: check_point_gaia_os_version.nbin

Configuration: Enable paranoid mode

Risk Information

Risk Factor: High

CVSS Score Source: manual

CVSS Score Rationale: Score based on analysis of effect of the vulnerability.

CVSS v2.0

Base Score: 7.6

Vector: CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 9

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:o:check_point:gaia_os:*:*:*:*:*:*:*:*

Required KB Items: Settings/ParanoidReport, Host/Check_Point/version, Host/Check_Point/model

Patch Publication Date: 5/12/2019

Vulnerability Publication Date: 6/26/2019