The Inquirer-Home

Checkpoint Firewall-1 vulnerability announced

VPNs allow for easy identification
Tue Jul 06 2004, 12:22

SECURITY TESTING COMPANY NTA MONITOR has today issued a vulnerability warning for the Checkpoint Firewall-1 system - Checkpoint Firewall-1 VPNs are apparently visible to external hackers, which makes it possible for attackers to identify the firewall type and version number.

A fingerprinting technique, developed by NTA Monitor and dubbed IKE Vendor ID fingerprinting, allows the specific version of Firewall-1 to be identified. NTA reckons that the security issue affects all of the Checkpoint Firewall-1 products that are running IPsec VPN - currently there is no vendor fix, disabling IPsec is the only known workaround so far.

Roy Hills, technical director at NTA Monitor says "VPNs have been assumed to be an invisible and secure method of communication between a server and a remote connection. But such thinking is naïve."

Hills also said network admins need to check that they are aware of VPNs configured within their network, and must make sure they're using the latest security releases. µ

IKE Scan tool
Detailed vulnerability information


Share this:

blog comments powered by Disqus
Subscribe to INQ newsletters

Sign up for INQbot – a weekly roundup of the best from the INQ

Existing User
Please fill in the field below to receive your profile link.
Sign-up for the INQBot weekly newsletter
Click here
INQ Poll

Microsoft Windows 10 poll

Which feature of Windows 10 are you most excited about?