Check Point Gaia Operating System Open Interfaces With Default Password (sk145612)

Critical Nessus Plugin ID 128283

Synopsis

The remote host is missing a vendor-supplied security patch.

Description

The remote host is running a version of Gaia Operating System that is vulnerable to attacks after a CPUSE clean install and before completing the First Time Wizard. This is due to the administrator password being reset during the CPUSE clean installation process without also resetting interface configurations.

As a result, after a CPUSE clean install and before completing the First Time Wizard, the default password may be used to connect on all publicly available interfaces on versions R80.10 Take 479, R80.20 and R80.20.M2. On R77.30, if the management interface is publicly available, it is open for connection via the default password.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Nessus has not checked whether the admin password was set and/or the First Time Wizard was completed following a CPUSE clean install with an affected CPUSE package.

Solution

See the vendor advisory for workarounds.

See Also

http://www.nessus.org/u?8e5ad950

Plugin Details

Severity: Critical

ID: 128283

File Name: check_point_gaia_sk145612.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 2019/08/28

Updated: 2019/08/28

Dependencies: 104670

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Critical

CVSS Score Source: manual

CVSS Score Rationale: Score based on analysis of effect of the vulnerability.

CVSS v2.0

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3.0

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:/o:check_point:gaia_os

Required KB Items: Host/Check_Point/version, Host/Check_Point/build, Settings/ParanoidReport

Patch Publication Date: 2019/04/30

Vulnerability Publication Date: 2019/01/31