Check Point Gaia Operating System Open Interfaces With Default Password (sk145612)

critical Nessus Plugin ID 128283


The remote host is missing a vendor-supplied security patch.


The remote host is running a version of Gaia Operating System that is vulnerable to attacks after a CPUSE clean install and before completing the First Time Wizard. This is due to the administrator password being reset during the CPUSE clean installation process without also resetting interface configurations.

As a result, after a CPUSE clean install and before completing the First Time Wizard, the default password may be used to connect on all publicly available interfaces on versions R80.10 Take 479, R80.20 and R80.20.M2. On R77.30, if the management interface is publicly available, it is open for connection via the default password.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Nessus has not checked whether the admin password was set and/or the First Time Wizard was completed following a CPUSE clean install with an affected CPUSE package.


See the vendor advisory for workarounds.

See Also

Plugin Details

Severity: Critical

ID: 128283

File Name: check_point_gaia_sk145612.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 8/28/2019

Updated: 8/28/2019

Dependencies: check_point_gaia_os_version.nbin

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Critical

CVSS Score Source: manual

CVSS Score Rationale: Score based on analysis of effect of the vulnerability.

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:o:check_point:gaia_os:*:*:*:*:*:*:*:*

Required KB Items: Settings/ParanoidReport, Host/Check_Point/version, Host/Check_Point/build

Patch Publication Date: 4/30/2019

Vulnerability Publication Date: 1/31/2019