Check Point Gaia Operating System Open Interfaces With Default Password (sk145612)

critical Nessus Plugin ID 128283
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is missing a vendor-supplied security patch.


The remote host is running a version of Gaia Operating System that is vulnerable to attacks after a CPUSE clean install and before completing the First Time Wizard. This is due to the administrator password being reset during the CPUSE clean installation process without also resetting interface configurations.

As a result, after a CPUSE clean install and before completing the First Time Wizard, the default password may be used to connect on all publicly available interfaces on versions R80.10 Take 479, R80.20 and R80.20.M2. On R77.30, if the management interface is publicly available, it is open for connection via the default password.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number. Nessus has not checked whether the admin password was set and/or the First Time Wizard was completed following a CPUSE clean install with an affected CPUSE package.


See the vendor advisory for workarounds.

See Also

Plugin Details

Severity: Critical

ID: 128283

File Name: check_point_gaia_sk145612.nasl

Version: 1.1

Type: local

Family: Firewalls

Published: 8/28/2019

Updated: 8/28/2019

Dependencies: check_point_gaia_os_version.nbin

Configuration: Enable paranoid mode

Risk Information

CVSS Score Source: manual

CVSS Score Rationale: Score based on analysis of effect of the vulnerability.


Risk Factor: Critical

Base Score: 10

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C


Risk Factor: Critical

Base Score: 10

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

Vulnerability Information

CPE: cpe:2.3:o:check_point:gaia_os:*:*:*:*:*:*:*:*

Required KB Items: Settings/ParanoidReport, Host/Check_Point/version, Host/Check_Point/build

Patch Publication Date: 4/30/2019

Vulnerability Publication Date: 1/31/2019