Description
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Viktor Steinmann · textdoshardware
https://www.exploit-db.com/exploits/26754
References (9)
Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/15757
Mailing List mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.html
Mailing List x_refsource_misc
http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.html
Third Party Advisory vendor-advisory
x_refsource_debian
http://www.us.debian.org/security/2006/dsa-1237
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/17837
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1015326
Mailing List x_refsource_misc
http://www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.html
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/23395
Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2005/2808
Scores
EPSS
0.0431
EPSS Percentile
89.0%
Details
CWE
CWE-264
Status
published
Products (4)
checkpoint/secureclient_ng
checkpoint/secureclient_ng
r56
checkpoint/vpn-1_secureclient
4.0
checkpoint/vpn-1_secureclient
4.1
Published
Dec 08, 2005
Tracked Since
Feb 18, 2026