<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2020-15862 - Net-SNMP through 5.7.3 has Improper Privilege Management if write access is enabled in Firewall and Security Management</title>
    <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102375#M8043</link>
    <description>&lt;P&gt;I was looking around and maybe i'm missing it, but has checkpoint addressed this issue? I'm not finding anything so far. Granted this seems to require write access be enabled which i'm guessing almost no one uses, but I was looking for some clarification.&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Tue, 17 Nov 2020 18:30:02 GMT</pubDate>
    <dc:creator>John_Fleming</dc:creator>
    <dc:date>2020-11-17T18:30:02Z</dc:date>
    <item>
      <title>CVE-2020-15862 - Net-SNMP through 5.7.3 has Improper Privilege Management if write access is enabled</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102375#M8043</link>
      <description>&lt;P&gt;I was looking around and maybe i'm missing it, but has checkpoint addressed this issue? I'm not finding anything so far. Granted this seems to require write access be enabled which i'm guessing almost no one uses, but I was looking for some clarification.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Nov 2020 18:30:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102375#M8043</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-11-17T18:30:02Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2020-15862 - Net-SNMP through 5.7.3 has Improper Privilege Management if write access is ena</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102382#M8044</link>
      <description>&lt;P&gt;Fixed in the R80.40 Version: Check Point Gaia releases R77 - R80.30 use 3rd party net-snmp package version 5.4.2.1, Check Point release R80.40 (and above) use net-snmp package version 5.8 (sk158852).&lt;/P&gt;</description>
      <pubDate>Tue, 17 Nov 2020 20:47:51 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102382#M8044</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-11-17T20:47:51Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2020-15862 - Net-SNMP through 5.7.3 has Improper Privilege Management if write access is ena</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102383#M8045</link>
      <description>&lt;P&gt;Oh great, so will you be posting a patch for anything below R80.40 then?&lt;/P&gt;</description>
      <pubDate>Tue, 17 Nov 2020 21:04:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102383#M8045</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-11-17T21:04:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2020-15862 - Net-SNMP through 5.7.3 has Improper Privilege Management if write access is ena</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102385#M8046</link>
      <description>&lt;P&gt;Its kind of unclear, but this seems to be the fixed version in the net-snmp which shows 5.8.1rc1 ?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://github.com/net-snmp/net-snmp/commit/77f6c60f57dba0aaea5d8ef1dd94bcd0c8e6d205" target="_blank"&gt;https://github.com/net-snmp/net-snmp/commit/77f6c60f57dba0aaea5d8ef1dd94bcd0c8e6d205&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 17 Nov 2020 21:16:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102385#M8046</guid>
      <dc:creator>John_Fleming</dc:creator>
      <dc:date>2020-11-17T21:16:17Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2020-15862 - Net-SNMP through 5.7.3 has Improper Privilege Management if write access is ena</title>
      <link>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102928#M8100</link>
      <description>&lt;P&gt;When we patch an issue in third party code, we don't necessarily rev the version number unless we actually update the relevant codebase to that version.&lt;BR /&gt;Specific to this CVE, it appears that this issue requires expert/root on the relevant gateway to exploit.&lt;BR /&gt;If you have that kind of access, you can pretty much do anything you want anyway.&lt;BR /&gt;&lt;BR /&gt;&lt;/P&gt;</description>
      <pubDate>Mon, 23 Nov 2020 04:53:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/Firewall-and-Security-Management/CVE-2020-15862-Net-SNMP-through-5-7-3-has-Improper-Privilege/m-p/102928#M8100</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-11-23T04:53:27Z</dc:date>
    </item>
  </channel>
</rss>

