Check Point Gaia Operating System Open Interfaces With Default Password (sk145612)

critical Nessus Plugin ID 128283

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The remote host is running a version of Gaia Operating System that is vulnerable to attacks after a CPUSE clean install and before completing the First Time Wizard. This is due to the administrator password being reset during the CPUSE clean installation process without also resetting interface configurations.

As a result, after a CPUSE clean install and before completing the First Time Wizard, the default password may be used to connect on all publicly available interfaces on versions R80.10 Take 479, R80.20 and R80.20.M2. On R77.30, if the management interface is publicly available, it is open for connection via the default password.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Nessus has not checked whether the admin password was set and/or the First Time Wizard was completed following a CPUSE clean install with an affected CPUSE package.

Solution

See the vendor advisory for workarounds.

See Also

http://www.nessus.org/u?8e5ad950

Plugin Details

Severity: Critical

ID: 128283

File Name: check_point_gaia_sk145612.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 8/28/2019

Updated: 8/28/2019

Configuration: Enable paranoid mode

Supported Sensors: Nessus

Risk Information

CVSS Score Rationale: Score based on analysis of effect of the vulnerability.

CVSS v2

Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: manual

CVSS v3

Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:check_point:gaia_os

Required KB Items: Settings/ParanoidReport, Host/Check_Point/version, Host/Check_Point/build

Patch Publication Date: 4/30/2019

Vulnerability Publication Date: 1/31/2019