<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Check point  vulnerable to CVE-2026-31431? in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276440#M105209</link>
    <description>&lt;P&gt;Quick check on a R82 test box: It seems to work there.&lt;/P&gt;</description>
    <pubDate>Mon, 04 May 2026 13:54:45 GMT</pubDate>
    <dc:creator>Steffen_Appel</dc:creator>
    <dc:date>2026-05-04T13:54:45Z</dc:date>
    <item>
      <title>Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276435#M105206</link>
      <description>&lt;P&gt;Hi.&lt;BR /&gt;&lt;BR /&gt;Any guidence from Check Point regarding&amp;nbsp;CVE-2026-31431 ?&lt;BR /&gt;&lt;A href="https://access.redhat.com/security/cve/cve-2026-31431#cve-details-description" target="_blank"&gt;https://access.redhat.com/security/cve/cve-2026-31431#cve-details-description&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 12:46:46 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276435#M105206</guid>
      <dc:creator>Mattias_Jansson</dc:creator>
      <dc:date>2026-05-04T12:46:46Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276437#M105207</link>
      <description>&lt;P&gt;At the moment, there is no information about Check Point's vulnerability for the reported CVE ... ...&lt;A href="https://support.checkpoint.com/security-advisories" target="_blank"&gt;https://support.checkpoint.com/security-advisories.&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;If I look on a R81.20 installation the affected module is not present; so at a first sight, this vulnerability doesn't affect Check Point product.&lt;/P&gt;
&lt;P&gt;We wati for someone in Check Point to provide a better answer.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 13:01:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276437#M105207</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-05-04T13:01:11Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276439#M105208</link>
      <description>&lt;P&gt;We are currently working on the official response. AFAIK, R81.20 and below are not affected. &lt;BR /&gt;&lt;BR /&gt;If you need an immediate response relevant to your versions in use, please open a ticket with TAC.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 13:18:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276439#M105208</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2026-05-04T13:18:49Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276440#M105209</link>
      <description>&lt;P&gt;Quick check on a R82 test box: It seems to work there.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 13:54:45 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276440#M105209</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2026-05-04T13:54:45Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276452#M105212</link>
      <description>&lt;P&gt;The issue is present in R82 and up, but there are plenty of other local privilege escalation vectors. This one is no worse than&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk171751" target="_self"&gt;CVE-2021-3156 (sk171751)&lt;/A&gt;, for example. R82.10 still ships sudo&amp;nbsp;1.8.19p2.&lt;/P&gt;
&lt;P&gt;If you need something now,&amp;nbsp;&lt;A href="https://access.redhat.com/security/cve/cve-2026-31431" target="_self"&gt;Red Hat's mitigation&lt;/A&gt; works on all versions which have the problem, including non-Red-Hat distributions. Just keep in mind it doesn't affect any of the other local privilege escalation bugs.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 18:21:01 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276452#M105212</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-04T18:21:01Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276453#M105213</link>
      <description>&lt;P&gt;&lt;STRONG&gt;R81.20 and earlier are definitely not impacted by CVE-2026-31431.&lt;/STRONG&gt; The problem was introduced in Linux 4.14. R81.20 uses kernel&amp;nbsp;3.10.0-1160.&lt;/P&gt;
&lt;P&gt;R82 is the first release to use a kernel version ≥4.14.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 18:27:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276453#M105213</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-04T18:27:21Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276455#M105214</link>
      <description>&lt;P&gt;On R82 MGMT algif_aead is not in use. I dont have R82 gateway.&amp;nbsp;I assume it could be used on the gateway for an IPsec VPN. I also assumed it might be used for MGMT for SIC, but it isn’t. Even if it is, the question is whether it’s possible to carry out an attack.&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Screenshot 2026-05-04 215417.png" style="width: 999px;"&gt;&lt;img src="https://community.checkpoint.com/t5/image/serverpage/image-id/34178i27D60D4918CFEACC/image-size/large?v=v2&amp;amp;px=999" role="button" title="Screenshot 2026-05-04 215417.png" alt="Screenshot 2026-05-04 215417.png" /&gt;&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 19:57:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276455#M105214</guid>
      <dc:creator>SubZer0</dc:creator>
      <dc:date>2026-05-04T19:57:06Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276457#M105215</link>
      <description>&lt;P&gt;PoC script for CVE-2026-31431&lt;BR /&gt;&lt;A href="https://github.com/AliHzSec/CVE-2026-31431/blob/master/main.py" target="_blank"&gt;https://github.com/AliHzSec/CVE-2026-31431/blob/master/main.py&lt;/A&gt;&lt;BR /&gt;&lt;BR /&gt;My conclusion: Even if the FW is vulnerable, an attacker would first need to gain access to the FW… so this vulnerability doesn’t really help them, since they already have access &lt;span class="lia-unicode-emoji" title=":slightly_smiling_face:"&gt;🙂&lt;/span&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 20:24:33 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276457#M105215</guid>
      <dc:creator>SubZer0</dc:creator>
      <dc:date>2026-05-04T20:24:33Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276458#M105216</link>
      <description>&lt;P&gt;On RHEL (and Gaia is based on RHEL), it's not a module, it's built into the kernel. It's definitely present in R82 and R82.10.&lt;/P&gt;</description>
      <pubDate>Mon, 04 May 2026 20:28:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276458#M105216</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-04T20:28:58Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276463#M105219</link>
      <description>&lt;P&gt;As I wrote it works, but for the python version you need to be in a group (bin) which allows python to execute, but python is just an example, the bug is exploitanble in languages too.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 06:22:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276463#M105219</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2026-05-05T06:22:31Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276467#M105220</link>
      <description>&lt;P&gt;Yes and no, remember the remote shell bug two years ago?&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 07:42:00 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276467#M105220</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2026-05-05T07:42:00Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276481#M105228</link>
      <description>&lt;P&gt;R82+ versions are affected. However, to execute the exploit, a user has to have access to the expert shell, meaning that the user is already privileged, which defeats the purpose. Non-privileged users either cannot access FW at all or don't have the expert shell. Users at the root level don't need to elevate their permissions; they already have the maximum permissions.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 09:55:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276481#M105228</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2026-05-05T09:55:40Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276491#M105232</link>
      <description>&lt;P&gt;Yes, unless they find a way like 2 years ago...&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 13:05:08 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276491#M105232</guid>
      <dc:creator>Steffen_Appel</dc:creator>
      <dc:date>2026-05-05T13:05:08Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276501#M105241</link>
      <description>&lt;P&gt;Even then, the exploit at the time was already able to run as root with full access. &amp;nbsp;However, a blended attack is always a risk.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 13:57:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276501#M105241</guid>
      <dc:creator>Duane_Toler</dc:creator>
      <dc:date>2026-05-05T13:57:11Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276502#M105242</link>
      <description>&lt;P&gt;Maybe yes, but in any case the risk is not so high/critical because at the moment the exposure can be mitigated by filter IP addresses that can access the affected gateways.&lt;/P&gt;
&lt;P&gt;So from my point of view, it would be enough to wait the next JHF that probably could solve it.&lt;/P&gt;</description>
      <pubDate>Tue, 05 May 2026 14:00:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276502#M105242</guid>
      <dc:creator>simonemantovani</dc:creator>
      <dc:date>2026-05-05T14:00:44Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276557#M105253</link>
      <description>&lt;P&gt;The official response is ready and available in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk184928" target="_self"&gt;&lt;SPAN&gt;sk184928&lt;/SPAN&gt;&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Quoting from there:&lt;BR /&gt;&lt;BR /&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;DIV id="symptoms"&gt;
&lt;H2 class="css-3eqwxe"&gt;Symptoms&lt;/H2&gt;
&lt;DIV&gt;
&lt;UL&gt;
&lt;LI&gt;On April 22, 2026, CERT published vulnerabilities in the Linux kernel.&amp;nbsp;&lt;BR /&gt;This issue received the ID&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;A href="https://www.cve.org/CVERecord?id=CVE-2026-31431" rel="noopener" target="_blank"&gt;CVE-2026-31431&lt;/A&gt;.&amp;nbsp;&lt;BR /&gt;It addresses an issue in the Linux kernel’s cryptographic interface (&lt;EM&gt;algif_aead&lt;/EM&gt;).&lt;/LI&gt;
&lt;/UL&gt;
&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV id="solution"&gt;
&lt;H2 class="css-3eqwxe"&gt;Solution&lt;/H2&gt;
&lt;DIV&gt;
&lt;P&gt;&lt;STRONG&gt;Practical risk: Low.&lt;BR /&gt;&lt;BR /&gt;&lt;/STRONG&gt;The vulnerability requires non-root local code execution, which the Gaia OS standard role model does not expose, because administrative access goes through Expert mode (already root), and non-admin roles are restricted to Clish.&lt;STRONG&gt;&lt;BR /&gt;&lt;/STRONG&gt;&lt;/P&gt;
If you have created non-admin users with non-Clish shell access (treating them as effectively administrative), and this was not intentional, remove the shell access.&lt;BR /&gt;By default, only&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;EM&gt;adminRole&lt;/EM&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;users have shell access; all other roles use Clish.&lt;BR /&gt;&lt;BR /&gt;Note: R81.20 and earlier versions are not affected.&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;DIV class="dont-print"&gt;
&lt;DIV class="css-1mb2pxv"&gt;&amp;nbsp;&lt;/DIV&gt;
&lt;/DIV&gt;
&lt;P&gt;&lt;SPAN&gt;&amp;nbsp;&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 06 May 2026 07:08:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276557#M105253</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2026-05-06T07:08:58Z</dc:date>
    </item>
    <item>
      <title>Re: Check point  vulnerable to CVE-2026-31431?</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276667#M105283</link>
      <description>&lt;P&gt;There are now two more known, trivial local privilege escalation vulnerabilities which don't even have CVE numbers yet. It sounds like the mitigation for CVE-2026-31431&amp;nbsp;&lt;STRONG&gt;does not&lt;/STRONG&gt; mitigate the two new ones.&lt;/P&gt;
&lt;P&gt;&lt;A href="https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md" target="_self"&gt;https://github.com/V4bel/dirtyfrag/blob/master/assets/write-up.md&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 07 May 2026 21:05:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/Check-point-vulnerable-to-CVE-2026-31431/m-p/276667#M105283</guid>
      <dc:creator>Bob_Zimmerman</dc:creator>
      <dc:date>2026-05-07T21:05:38Z</dc:date>
    </item>
  </channel>
</rss>

