HomePentest-Tools.com Logo

Checkpoint SecuRemote Information Leakage CVE-2001-1303

Not available
CVSSv3 Score
Not available
Vulnerability description

The remote host seems to be a Checkpoint FireWall-1 running SecuRemote. The SecuRemote service contains a vulnerability that allows attackers to gain information about the hosts, networks, and users configured on the Firewall.

Risk description

This will enable attackers to focus their attack strategy. You should not let this information leak out.


Either block the SecuRemotes ports (TCP 256 and 264) to untrusted networks, or upgrade to the latest version of Checkpoints Firewall-1. Workaround: You could restrict the topology download, so that only authenticated users can download it. Go to Policy Properties Desktop Security of your Policy Editor and uncheck respond to unauthenticated topology requests. After installing the Policy only authenticated Users can download the Topology.

Not available
Detectable with
Network Scanner
Scan engine
Exploitable with Sniper
CVE Published
Jul 18, 2001
Detection added at
Software Type
Not available
Not available
Not available