<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic vulnerability in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164977#M29563</link>
    <description />
    <pubDate>Wed, 05 Apr 2023 09:12:56 GMT</pubDate>
    <dc:creator>umar7</dc:creator>
    <dc:date>2023-04-05T09:12:56Z</dc:date>
    <item>
      <title>vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164977#M29563</link>
      <description />
      <pubDate>Wed, 05 Apr 2023 09:12:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164977#M29563</guid>
      <dc:creator>umar7</dc:creator>
      <dc:date>2023-04-05T09:12:56Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164978#M29564</link>
      <description>&lt;P&gt;Both ports are not listed here:&amp;nbsp;&lt;A class="cp_link sc_ellipsis" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk52421&amp;amp;partition=Advanced&amp;amp;product=All" target="_blank"&gt;sk52421: &lt;STRONG&gt;Ports&lt;/STRONG&gt; &lt;STRONG&gt;used&lt;/STRONG&gt; by &lt;STRONG&gt;Check Point&lt;/STRONG&gt; softwar&lt;/A&gt;e&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 08:42:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164978#M29564</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2022-12-13T08:42:14Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164981#M29566</link>
      <description>&lt;P&gt;Those seems to be a httpd2 ports for multiportals. Since there are lot many portals running like captive portal, Mobile access portal, NAC, userChek on Apache and there are vhosts configuration done under Apache and those ports then start listening on then and has got a forwarding done internally&amp;nbsp;&lt;/P&gt;&lt;P&gt;e.g.&lt;/P&gt;&lt;P&gt;For me port 20988 listens on Apache2 which says it is opened for multiportal NAC/Captive Portal&lt;/P&gt;&lt;P&gt;/opt/CPshrd-R81/web/Apache/bin/httpd -DFOREGROUND -k start -f /opt/CPshrd-R81/conf/multiportal/httpd-conf/nac/httpd.conf -DPORTAL_NAME_nac&lt;/P&gt;&lt;P&gt;You will get more details from mpclient list command&amp;nbsp;&lt;/P&gt;&lt;P&gt;mpclient list&lt;BR /&gt;DLPSenderPortal&lt;BR /&gt;ExchangeRegistration&lt;BR /&gt;ReverseProxyClear&lt;BR /&gt;ReverseProxySSL&lt;BR /&gt;SecurePlatform&lt;BR /&gt;UserCheck&lt;BR /&gt;nac&lt;BR /&gt;nac_transparent_auth&lt;BR /&gt;saml-vpn&lt;BR /&gt;sslvpn&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 09:12:31 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164981#M29566</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2022-12-13T09:12:31Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164983#M29568</link>
      <description>&lt;P&gt;First, half-open ports are not necessarily a vulnerability, even if Nessus thinks they are.&amp;nbsp; Vulnerability is something you can exploit.&lt;/P&gt;
&lt;P&gt;Second, if you believe you indeed found a vulnerability in any of Check Point products,&lt;U&gt; the only correct way&lt;/U&gt; to disclose it is to &lt;U&gt;adhere to responsible disclose principles&lt;/U&gt; and to use &lt;A href="https://www.checkpoint.com/security-issue/" target="_self"&gt;this form&lt;/A&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 09:17:37 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/164983#M29568</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2022-12-13T09:17:37Z</dc:date>
    </item>
    <item>
      <title>Re: vulnerability</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/165059#M29587</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;We use a number of random high TCP ports to redirect certain traffic to for various reasons (Threat Prevention, UserCheck, among others).&lt;BR /&gt;Even there is a vulnerability there, it’s only accessible from the local system and would require root access (expert mode) to do so, which should only be provided to authorized individuals.&lt;BR /&gt;Which makes this “vulnerability” not interesting.&lt;/P&gt;
&lt;P&gt;The fact a vulnerability scanner can find this suggests your access policy needs to be improved.&lt;BR /&gt;Best practice is to have a stealth rule in place that blocks all traffic to the gateway except for the traffic needed to manage the device.&lt;/P&gt;</description>
      <pubDate>Tue, 13 Dec 2022 14:53:04 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/vulnerability/m-p/165059#M29587</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2022-12-13T14:53:04Z</dc:date>
    </item>
  </channel>
</rss>

