Feeds

Password guessing games with Check Point firewall

Two security flaws

  • alert
  • submit to reddit

Security for virtualized datacentres

Security researchers have discovered two potentially serious flaws with Check Point's flagship FireWall-1 firewall which give rise to both username guessing and sniffing issues.

First, affected versions permit attackers to determine if a firewall username is valid without having to know the associated password. This enabling crackers to guess valid usernames using a dictionary attack.

The guessing rate is limited mostly by the firewall CPU rather than by the Internet link speed, according to security testing specialists NTA Monitor, which discovered the problem. In effect, this means that companies using a hi-spec firewall server increase the speed at which an attacker can guess passwords, NTA
warns.

In addition, NTA Monitor discovered that VPN usernames are passed in the clear without encryption, allowing anyone who is able to sniff network traffic between VPN clients and the firewall to observe usernames in transit. The flaws exploit the Internet Key Exchange (IKE) encryption scheme and affect all Check Point FireWall-1 systems of 4.0 or above.

Roy Hills, Technical Director, NTA Monitor, said that the flaws leave a back door to enterprises "wide open to hackers".

"The biggest problem is that it is not necessary to send a password to obtain a reply from the Firewall. Given that both users and system administrators often chose weak passwords, it is likely that any attacker will be able to guess at least one password and thus gain access to the VPN - and from there most configurations easily allow full access to the company's resources."

Hills expressed surprise at discovering the flaw. He notes that it is standard security practice in many other authentication mechanisms, including Unix logon, to wait until both username and password are supplied before, if either is incorrect, sending a generic error message.

If certificates, rather than shared secrets, are used for IKE authentication, then neither problem occurs. However, NTA Monitor found that in practice the majority of users use shared secret authentication rather than certificates because they are easier to configure and better understood by both sysadmins and users.

Check Point has not responded to our request for comment at time of writing. ®

External Links

|NTA Monitor's alert which contains detailed technical descriptions of the problem

Beginner's guide to SSL certificates

More from The Register

next story
FYI: OS X Yosemite's Spotlight tells Apple EVERYTHING you're looking for
It's on by default – didn't you read the small print?
Edward who? GCHQ boss dodges Snowden topic during last speech
UK spies would rather 'walk' than do 'mass surveillance'
Microsoft pulls another dodgy patch
Redmond makes a hash of hashing add-on
NOT OK GOOGLE: Android images can conceal code
It's been fixed, but hordes won't have applied the upgrade
Apple grapple: Congress kills FBI's Cupertino crypto kybosh plan
Encryption would lead us all into a 'dark place', claim G-Men
DEATH by PowerPoint: Microsoft warns of 0-day attack hidden in slides
Might put out patch in update, might chuck it out sooner
'LulzSec leader Aush0k' found to be naughty boy not worthy of jail
15 months home detention leaves egg on feds' faces as they grab for more power
prev story

Whitepapers

Cloud and hybrid-cloud data protection for VMware
Learn how quick and easy it is to configure backups and perform restores for VMware environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Three 1TB solid state scorchers up for grabs
Big SSDs can be expensive but think big and think free because you could be the lucky winner of one of three 1TB Samsung SSD 840 EVO drives that we’re giving away worth over £300 apiece.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.