Feeds

Check Point plays down FireWall-1 bug reports

Privilege escalation

Internet Security Threat Report 2014

Security giant Check Point has played down the seriousness of reports of multiple vulnerabilities in a supposedly locked-down version of its flagship FireWall-1/VPN-1 security software.

Spanish security firm Pentest discovered multiple buffer overflow vulnerabilities during the course of a comprehensive security evaluation of the most secure version of the Check Point FireWall-1/VPN-1, Secure Platform R60, which is certified to an EAL4+ assurance level of the Common Criteria evaluation.

According to Pentest, the ten buffer overflows discovered in different applications (mostly command line utilities) in Secure Platform R60 ought to have been spotted during the development process. Pentest expresses doubts about whether the certification of the firewall according to Common Criteria EAL4+ is merited on the basis of the flaws it unearthed.

Although still widely known in the security industry as FireWall-1, Check Point's firewall technology is now sold as an inseparable part of its VPN-1 line, which include virtual private network functionality.

Pentest's analysis runs to more than 200 pages and is the most detailed we've ever seen on FireWall-1/VPN-1 or any other firewall, come to that. Importantly, Pentest was unable to demonstrate that any of the flaws it unearthed lent itself to remote exploitation, though it warned this might be possible.

In a response, Check Point said that Pentest's research only showed how a legitimate administrator might conduct local privilege escalation. "Ramifications of the reported issue are very limited because an exploit cannot be initiated by someone who is not already an administrator; also, the issue cannot be exploited remotely," it said.

Nonetheless, Check Point acknowledged that Pentest has identified a number of problems, and outlined a timetable for publishing fixes.

"A fix for the command line utility mentioned in the report, SDSUtil, is available as of today for any customer from Check Point Technical Support. In addition we are actively working on creating a comprehensive resolution for the problem - we expect to have a fix for VPN-1 NGX releases within this month. Fixes for other releases will be available per demand from Check Point Technical Support," it added.

CheckPoint and Pentest have been in discussion about the bugs for around six months, prior to its publication of the Spanish security outfit's analysis on Monday.

Hugo Vázquez Caramés, the lead researcher at Pentest who carried out the evaluation, expressed disappointment at Check Point's response, which he argues fails to fully address the issue.

"Check Point is trying to obscure the multiple flaws [by] misunderstanding our advisory. They state that my exploit is not dangerous. Yes, it is not, because it's a proof of concept. I did not want to release a dangerous one, but if they want I can do it," he said.

"Check Point is not talking about the main problem - multiple overflows in a EAL4+ certified product - just because it is embarrassing to admit," he added. ®

Internet Security Threat Report 2014

More from The Register

next story
George Clooney, WikiLeaks' lawyer wife hand out burner phones to wedding guests
Day 4: 'News'-papers STILL rammed with Clooney nuptials
Shellshock: 'Larger scale attack' on its way, warn securo-bods
Not just web servers under threat - though TENS of THOUSANDS have been hit
Apple's new iPhone 6 vulnerable to last year's TouchID fingerprint hack
But unsophisticated thieves need not attempt this trick
PEAK IPV4? Global IPv6 traffic is growing, DDoS dying, says Akamai
First time the cache network has seen drop in use of 32-bit-wide IP addresses
Oracle SHELLSHOCKER - data titan lists unpatchables
Database kingpin lists 32 products that can't be patched (yet) as GNU fixes second vuln
Who.is does the Harlem Shake
Blame it on LOLing XSS terroristas
Researchers tell black hats: 'YOU'RE SOOO PREDICTABLE'
Want to register that domain? We're way ahead of you.
prev story

Whitepapers

Forging a new future with identity relationship management
Learn about ForgeRock's next generation IRM platform and how it is designed to empower CEOS's and enterprises to engage with consumers.
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
The next step in data security
With recent increased privacy concerns and computers becoming more powerful, the chance of hackers being able to crack smaller-sized RSA keys increases.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
A strategic approach to identity relationship management
ForgeRock commissioned Forrester to evaluate companies’ IAM practices and requirements when it comes to customer-facing scenarios versus employee-facing ones.