| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.5 | $0-$5k | 0.00 |
Summary
A vulnerability was found in Check Point Web Intelligence Gold and classified as problematic. This issue affects some unknown processing. The manipulation results in denial of service. This vulnerability is known as CVE-2007-2689. No exploit is available.
Details
A vulnerability classified as critical has been found in Check Point Web Intelligence Gold. Affected is an unknown code. The manipulation with an unknown input leads to a denial of service vulnerability. CWE is classifying the issue as CWE-404. The product does not release or incorrectly releases a resource before it is made available for re-use. This is going to have an impact on availability. CVE summarizes:
Check Point Web Intelligence does not properly handle certain full-width and half-width Unicode character encodings, which might allow remote attackers to evade detection of HTTP traffic.
The weakness was published 05/15/2007 as confirmed advisory (CERT.org). The advisory is available at kb.cert.org. This vulnerability is traded as CVE-2007-2689 since 05/15/2007. The exploitability is told to be easy. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. The technical details are unknown and an exploit is not available.
There is no information about possible countermeasures known. It may be suggested to replace the affected object with an alternative product.
The vulnerability is also documented in the vulnerability database at SecurityTracker (ID 1018067†). Similar entries are available at VDB-36860, VDB-36811, VDB-36809 and VDB-39534. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Vendor
Name
Version
License
Website
- Vendor: https://www.checkpoint.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 7.5VulDB Meta Temp Score: 7.5
VulDB Base Score: 7.5
VulDB Temp Score: 7.5
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Denial of serviceCWE: CWE-404
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Not defined
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: no mitigation knownStatus: 🔍
0-Day Time: 🔍
Timeline
05/15/2007 🔍05/15/2007 🔍
05/15/2007 🔍
05/16/2007 🔍
03/13/2015 🔍
01/13/2025 🔍
Sources
Vendor: checkpoint.comAdvisory: kb.cert.org
Status: Confirmed
CVE: CVE-2007-2689 (🔍)
GCVE (CVE): GCVE-0-2007-2689
GCVE (VulDB): GCVE-100-36810
CERT: 🔍
SecurityTracker: 1018067 - Check Point Web Intelligence Lets Remote Users Evade Detection With Certain Character Encodings
See also: 🔍
Entry
Created: 03/13/2015 14:56Updated: 01/13/2025 02:26
Changes: 03/13/2015 14:56 (44), 10/15/2017 11:28 (6), 01/13/2025 02:26 (17)
Complete: 🔍
Cache ID: 216:EBD:103

No comments yet. Languages: en.
Please log in to comment.