Rapid7 Vulnerability & Exploit Database

CheckPoint Endpoint Security Server Information Disclosure

Back to Search

CheckPoint Endpoint Security Server Information Disclosure

Severity
9
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:N)
Published
12/15/2010
Created
07/25/2018
Added
01/17/2011
Modified
12/04/2013

Description

The web interface of CheckPoint Endpoint Security Server 7.x (R71, R72 and R73) ships with an improperly protected configuration that allows remote, unauthenticated users to access arbitrary files in the 'bin', 'conf', 'templates', 'install' and 'logs' directories within the Tomcat directory. While the full extent of this vulnerability is not currently understood, at a minimum it allows attackers to obtain the private keys used to encrypt communication with the Endpoint Security Server management interface, making a man-in-the-middle attack considerably easier.

Solution(s)

  • checkpoint-ess-sk57881

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;