SofaWare Safe@Office 500 Utm Embedded NGX 7.0.45 cross-site request forgery
| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 7.0 | $0-$5k | 0.00 |
Summary
A vulnerability was found in SofaWare Safe@Office 500 Utm Embedded NGX 7.0.45 and classified as problematic. The affected element is an unknown function. Such manipulation leads to cross-site request forgery. This vulnerability is listed as CVE-2007-3464. The attack may be performed from remote. There is no available exploit. It is suggested to upgrade the affected component.
Details
A vulnerability was found in SofaWare Safe@Office 500 Utm Embedded NGX 7.0.45. It has been rated as critical. Affected by this issue is an unknown code. The manipulation with an unknown input leads to a cross-site request forgery vulnerability. Using CWE to declare the problem leads to CWE-352. The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request. Impacted is confidentiality, integrity, and availability. CVE summarizes:
Check Point SofaWare Safe@Office, with firmware before Embedded NGX 7.0.45 GA, does not require entry of the old password when changing the admin password, which might allow attackers to gain privileges by conducting a CSRF attack, making a password change on an unattended workstation, or other vectors.
The weakness was presented 06/26/2007 as confirmed posting (Bugtraq). The advisory is available at securityfocus.com. This vulnerability is handled as CVE-2007-3464 since 06/27/2007. The attack may be launched remotely. A simple authentication is needed for exploitation. Successful exploitation requires user interaction by the victim. The technical details are unknown and an exploit is not available.
Upgrading to version Embedded_ngx_7.0.39_ga eliminates this vulnerability.
The vulnerability is also documented in the databases at X-Force (35094), OSVDB (37644†) and Secunia (SA25822†). See VDB-3152 and VDB-37539 for similar entries. If you want to get best quality of vulnerability data, you may have to visit VulDB.
Product
Vendor
Name
Version
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 8.0VulDB Meta Temp Score: 7.0
VulDB Base Score: 8.0
VulDB Temp Score: 7.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Cross-site request forgeryCWE: CWE-352 / CWE-862 / CWE-863
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Unproven
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: UpgradeStatus: 🔍
0-Day Time: 🔍
Upgrade: Safe@Office 500 Utm Embedded_ngx_7.0.39_ga
Timeline
06/26/2007 🔍06/27/2007 🔍
06/27/2007 🔍
06/27/2007 🔍
06/27/2007 🔍
03/15/2015 🔍
10/27/2017 🔍
Sources
Advisory: securityfocus.com⛔Status: Confirmed
CVE: CVE-2007-3464 (🔍)
GCVE (CVE): GCVE-0-2007-3464
GCVE (VulDB): GCVE-100-37538
X-Force: 35094 - Check Point Safe at Office admin password modification
Secunia: 25822 - Check Point Products Cross-Site Request Forgery Vulnerability, Less Critical
OSVDB: 37644 - Check Point SofaWare Safe@Office Management Interface CSRF
See also: 🔍
Entry
Created: 03/15/2015 15:58Updated: 10/27/2017 08:54
Changes: 03/15/2015 15:58 (51), 10/27/2017 08:54 (8)
Complete: 🔍
Cache ID: 216:D57:103
If you want to get best quality of vulnerability data, you may have to visit VulDB.
No comments yet. Languages: en.
Please log in to comment.