Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-h4h7-37gr-c29h

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle attackers to spoof SSL servers by presenting an arbitrary certificate during a session established by a client.

Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle attackers to spoof SSL servers by presenting an arbitrary certificate during a session established by a client.

EPSS

Процентиль: 42%
0.00202
Низкий

Связанные уязвимости

nvd
около 12 лет назад

Check Point Endpoint Security MI Server through R73 3.0.0 HFA2.5 does not configure X.509 certificate validation for client devices, which allows man-in-the-middle attackers to spoof SSL servers by presenting an arbitrary certificate during a session established by a client.

EPSS

Процентиль: 42%
0.00202
Низкий