CVE-2005-4093

Checkpoint Secureclient NG - Access Control

Title source: rule
STIX 2.1

Description

Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Viktor Steinmann · textdoshardware
https://www.exploit-db.com/exploits/26754

References (9)

Core 9
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/15757
Third Party Advisory vendor-advisory x_refsource_debian
http://www.us.debian.org/security/2006/dsa-1237
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/17837
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1015326
Vendor Advisory third-party-advisory x_refsource_secunia
http://secunia.com/advisories/23395
Vendor Advisory vdb-entry x_refsource_vupen
http://www.vupen.com/english/advisories/2005/2808

Scores

EPSS 0.0431
EPSS Percentile 89.0%

Details

CWE
CWE-264
Status published
Products (4)
checkpoint/secureclient_ng
checkpoint/secureclient_ng r56
checkpoint/vpn-1_secureclient 4.0
checkpoint/vpn-1_secureclient 4.1
Published Dec 08, 2005
Tracked Since Feb 18, 2026