Vigil@nce - Check Point Session Authentication Agent: authentication disclosure
February 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can spoof the Security Gateway, in order to force the
Check Point Session Authentication Agent to send user credentials.
Impacted products: CheckPoint Security Gateway
Severity: 2/4
Creation date: 22/01/2014
Revision date: 28/01/2014
DESCRIPTION OF THE VULNERABILITY
The Check Point Session Authentication Agent product is used to
authenticate users on the Security Gateway.
However, as supported SSL algorithms do not protect against
Man-in-the-Middle attacks, an attacker can spoof the IP address of
the Security Gateway, in order to receive user credentials.
An attacker can therefore spoof the Security Gateway, in order to
force the Check Point Session Authentication Agent to send user
credentials.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN