<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HowTo: React on Check Point Information Disclosure in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/109573#M20784</link>
    <description>&lt;P&gt;Hello gentleman,&lt;BR /&gt;&lt;BR /&gt;I also am very interested in the scenario here and did read your posts as I have the exact same situation with a client assessment. I also not have been sure how I should rate this finding and if it it indeed poses a security risk. My thoughts have been similar to&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/55366"&gt;@Bjoern_K&lt;/a&gt;'s.&amp;nbsp;&lt;BR /&gt;But I also am very interested in an update on the subject and what the best practice is to protect that Port/Webserver.&lt;BR /&gt;&lt;BR /&gt;Thank you all very much for the clarifications!&lt;/P&gt;</description>
    <pubDate>Tue, 02 Feb 2021 14:37:38 GMT</pubDate>
    <dc:creator>x13</dc:creator>
    <dc:date>2021-02-02T14:37:38Z</dc:date>
    <item>
      <title>HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/9773#M1326</link>
      <description>&lt;DIV class=""&gt;
&lt;P&gt;Every now and then auditors reviewing and penetrating Check Point firewalls are often criticizing&amp;nbsp;a http web portal being accessible&amp;nbsp;on tcp-port 18264 of the firewall's external interface providing a so called Internal_CA for download.&lt;BR /&gt;&lt;IMG style="display: block; margin-left: auto; margin-right: auto;" class="image-1 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75182_ca.png" border="0" alt="" width="656" height="380" /&gt;Don't be fooled, &lt;STRONG&gt;this is &lt;SPAN&gt;not&lt;/SPAN&gt; the &lt;A href="https://community.checkpoint.com/thread/7459-ica-management-tool#comment" target="_blank" rel="noopener"&gt;Internal CA Management Tool&lt;/A&gt;&lt;/STRONG&gt;, which runs on tcp-port 18265 on your SmartCenter once you enabled it. See:&lt;/P&gt;
&lt;P&gt;&lt;IMG style="display: block; margin-left: auto; margin-right: auto;" class="image-2 j-img-centered jive-image" src="https://community.checkpoint.com/legacyfs/online/checkpoint/75199_pastedImage_3.png" border="0" /&gt;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;What's it then?&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;Your &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32682" target="_blank" rel="noopener"&gt;Check Point Firewall just allows obtaining CRLs via an HTTP request on ICA port 18264/tcp&lt;/A&gt;.&lt;BR /&gt;See: &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk32682" target="_blank" rel="noopener"&gt;sk32682&lt;/A&gt;, &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99076" target="_blank" rel="noopener"&gt;sk99076&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;Check Point writes:&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;SPAN&gt;&lt;STRONG&gt;Is this a vulnerability? No.&lt;/STRONG&gt;&lt;/SPAN&gt; All CAs have to do this.&lt;BR /&gt;&lt;SPAN&gt;&lt;STRONG&gt;This is a security feature, not a security problem.&lt;/STRONG&gt;&lt;/SPAN&gt; Without publishing the CRL, you lose security.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;Auditors also like to&amp;nbsp;&lt;SPAN&gt;criticize port &lt;STRONG&gt;264&lt;/STRONG&gt;&amp;nbsp;TCP being open disclosing the firewall's hostname and ICA name.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;This can simply be verified on your own with the one-liner below (&lt;EM&gt;replace x.x.x.x with the IP of your Check Point).&lt;/EM&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;LI-CODE lang="python"&gt;printf '\x51\x00\x00\x00\x00\x00\x00\x21\x00\x00\x00\x0bsecuremote\x00' | nc -q 1 x.x.x.x 264 | grep -a CN | cut -c 2-&lt;/LI-CODE&gt;
&lt;P&gt;&lt;SPAN&gt;Check Point considers this &lt;STRONG&gt;public information&lt;/STRONG&gt; (&lt;A style="color: #2989c5;" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk69360" target="_blank" rel="noopener"&gt;sk69360&lt;/A&gt;).&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;Also read &lt;A style="color: #2989c5;" href="https://community.checkpoint.com/thread/9186-hostname-disclosure" target="_blank" rel="noopener"&gt;this interesting thread&lt;/A&gt; about the hostname disclosure.&lt;/SPAN&gt;&lt;/P&gt;
&lt;BLOCKQUOTE class="jive_macro_quote jive-quote jive_text_macro" style="background-color: #bbffbb;"&gt;&lt;STRONG&gt;You can still improve security!&lt;/STRONG&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&lt;STRONG&gt;Option 1:&lt;/STRONG&gt; Check the implied rules part in&amp;nbsp;&lt;A href="https://support.checkpoint.com/results/sk/sk132712" target="_blank" rel="noopener"&gt;sk132712&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Option 2:&lt;/STRONG&gt; Exclude&amp;nbsp;&lt;EM&gt;FW1_ica_services&lt;/EM&gt; on port 18264 (&lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk35292" target="_blank" rel="noopener"&gt;sk35292&lt;/A&gt;) from the implied rules and explicitly define a rule allowing access to this port from specific IP addresses. This only works if RemoteAccess VPN users don't connect from dynamic IPs.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Option 3:&lt;/STRONG&gt;&amp;nbsp;Detect and &lt;A href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk110873" target="_blank" rel="noopener"&gt;prevent port scans via IPS&lt;/A&gt; and/or &lt;A href="https://community.checkpoint.com/thread/8840-how-can-i-avoid-host-port-scan" target="_blank" rel="noopener"&gt;SmartEvent&lt;/A&gt;.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Option 4:&lt;/STRONG&gt; Block known scanners, such as&amp;nbsp;&lt;SPAN&gt;&lt;A href="https://community.checkpoint.com/t5/Management/HowTo-Block-IoT-scanners-like-Shodan-Censys-Shadowserver-PAN/m-p/124612" target="_self"&gt;Shodan, Censys, Shadowserver and others&lt;/A&gt;.&lt;/SPAN&gt;&lt;/P&gt;
&lt;P&gt;&lt;SPAN&gt;&lt;STRONG&gt;Option 5:&lt;/STRONG&gt;&amp;nbsp;Configure a Geo Policy and follow this &lt;A href="https://community.checkpoint.com/t5/General-Topics/HowTo-Protections-against-a-Cyber-War/m-p/142613#M25304" target="_self"&gt;HowTo: Protections against a Cyber War&lt;/A&gt;&lt;/SPAN&gt;&lt;/P&gt;
&lt;/DIV&gt;</description>
      <pubDate>Wed, 30 Jul 2025 21:25:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/9773#M1326</guid>
      <dc:creator>Danny</dc:creator>
      <dc:date>2025-07-30T21:25:21Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/9774#M1327</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Hi Danny,&lt;/P&gt;&lt;P&gt;This is great information. Recently we have faced this issue for one of our client.&lt;/P&gt;&lt;P&gt;In Pen test, it was flagged with issue 18265 port ICA services.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 28 Nov 2018 12:18:17 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/9774#M1327</guid>
      <dc:creator>Gaurav_Pandya</dc:creator>
      <dc:date>2018-11-28T12:18:17Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/59346#M11984</link>
      <description>&lt;P&gt;Great post. not sure if this is the correct area but I have a tricky question from our PCI DSS ASV process. They now have to check against OWASP and have detected 2 security misconfiguration items on our CP firewall running R77.30&lt;/P&gt;&lt;P&gt;1) This application does not enable X-XSS-Protection - X-XSS-Protection header missing on :18264&lt;/P&gt;&lt;P&gt;2) This application does not set X-Content-Type-Options - X-Content-Type-Options header missing on :18264&lt;/P&gt;&lt;P&gt;They say the JavaScript on this port is very 'dated' to be polite. The ASV advises remediation could be either:&lt;/P&gt;&lt;P&gt;a) Enable HTTP Strict Transport Security&lt;/P&gt;&lt;P&gt;b) Enable the following headers:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;X-Frame-Options or Content-Security-Policy with the frame-ancestors directive.&lt;/LI&gt;&lt;LI&gt;X-XSS-Protection&lt;/LI&gt;&lt;LI&gt;X-Content-Type-Options&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;for both 1 and 2 above.&lt;/P&gt;&lt;P&gt;We will be upgrading this R77.30 to R88.20 in September, but in the mean time we are wondering if there are any configuration options variable to resolve this issue.&lt;/P&gt;&lt;P&gt;Thanks,&lt;/P&gt;&lt;P&gt;Simon&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2019 12:06:43 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/59346#M11984</guid>
      <dc:creator>Simon_T</dc:creator>
      <dc:date>2019-07-31T12:06:43Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/59634#M12055</link>
      <description>&lt;P&gt;Hi,&lt;/P&gt;
&lt;P&gt;The site in question is for downloading the CA certificate and path or for downloading the CRL for correct certificate behavior. While Check Point always strives to improve security and will look into adding the missing security headers, I would like to explain why it is not a vulnerability not having them in this case:&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;X-XSS-Protection:&lt;/STRONG&gt;&amp;nbsp;this one is to block XSS sent in the request to the site. &lt;EM&gt;Not relevant since there are no parameters sent on request to this site that can be the source of the XSS attack, and the default by the browsers is to enable anyway.&lt;/EM&gt;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection" target="_blank"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-XSS-Protection&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;X-Content-Type-Options:&lt;/STRONG&gt;&amp;nbsp;this is so that you don’t load a file of one type as another (i.e. loading plain-text as JavaScript). &lt;EM&gt;Not relevant since we only load our own local files and not some arbitrary file that may be misconfigured.&lt;/EM&gt; &lt;BR /&gt;&lt;A href="https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options" target="_blank"&gt;https://developer.mozilla.org/en-US/docs/Web/HTTP/Headers/X-Content-Type-Options&lt;/A&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Ethan&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 09:22:58 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/59634#M12055</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2019-08-05T09:22:58Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/59635#M12056</link>
      <description>&lt;P&gt;Thanks,&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/10237"&gt;@Ethan_Schorer&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Mon, 05 Aug 2019 09:27:59 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/59635#M12056</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2019-08-05T09:27:59Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105752#M20263</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;&lt;BR /&gt;A colleague of mine and me recently stumbled over this issue during a client assignment. We then also found this forum post, which seems misleading to us.&lt;/P&gt;&lt;P&gt;The descriptions reads like only CRL files are being offered for download. However, the discussed web portal actually offers a CA certificate for download and instructs the user to manually install it. The download files are not merely CRLs but certificates, as can for example be checked by trying to install them as certificates in a browser (for example in Firefox), which would not work with a .crl file.&lt;/P&gt;&lt;P&gt;Since the site and the CA certificate are transported insecurely over http, an attacker would be able to attack the data transfer in a man-in-the-middle-attack, swap the transfered certificate with a malicious one (i.e. one that the attacker knows the secret keys for) and thereby manipulate the user to install a malicious certificate. This could allow further man-in-the-middle attacks on the user who has now installed a malicious CA certificate.&lt;/P&gt;&lt;P&gt;Could you please clarify this issue? The connection to the linked article about the CRLs is not really obvious as well, since it does not mention the portal or the CA certificate at all. Even if the port is (also) used to distribute CRLs over http, it should not transport CA certificates over http as well.&lt;/P&gt;&lt;P&gt;Thank you,&lt;BR /&gt;Björn&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 14:35:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105752#M20263</guid>
      <dc:creator>Bjoern_K</dc:creator>
      <dc:date>2020-12-17T14:35:05Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105774#M20265</link>
      <description>&lt;P&gt;The ICA portal runs on a different port (18265) than the CRL retrieval port (18264) and&amp;nbsp;is not exposed to the Internet by any implied rules.&lt;BR /&gt;The ICA Portal should only be accessed from trusted networks.&lt;BR /&gt;Management Servers in general should be deployed on a segmented network with strict access controls in place as a best practice.&lt;/P&gt;</description>
      <pubDate>Thu, 17 Dec 2020 19:09:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105774#M20265</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-17T19:09:52Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105871#M20282</link>
      <description>&lt;P&gt;HI PhoneBoy,&lt;/P&gt;&lt;P&gt;I'm not talking about the ICA portal, I'm talking about the Certificate Services portal which is available on port 18264 (first screenshot in the initial post). This portal offers CA certificates for download over http and even instructs the user to install the certificate. While it might be the case that this port is also used for CRLs (I don't have detailed knowledge about the CheckPoint products), it &lt;STRONG&gt;also&lt;/STRONG&gt; offers CA certificates.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 16:37:40 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105871#M20282</guid>
      <dc:creator>Bjoern_K</dc:creator>
      <dc:date>2020-12-18T16:37:40Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105872#M20283</link>
      <description>&lt;P&gt;Which kind of attack do you think is possible using this available CA cert ?&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 16:47:56 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105872#M20283</guid>
      <dc:creator>G_W_Albrecht</dc:creator>
      <dc:date>2020-12-18T16:47:56Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105873#M20284</link>
      <description>&lt;P&gt;As described in my original comment, a man-in-the-middle attacker could switch this CA certificate during transport to a CA certificate that the attacker controls (i.e. knows the secret keys to). Since the website instructs the user to install the certificates, it would be easy to manipulate the user to install this malicious certificate or the user might do it on his own (since this is the use case for the original CA certificate anyway). This would enable the attacker to mount further MITM attacks on the victim, since the victim now has a CA certificate installed that the attacker controls.&lt;/P&gt;&lt;P&gt;On top of this there are also all attacks possible that are possible on any http page. For example spread malware, deface it, add a fake login form and steal credentials this way and so on.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 16:58:48 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105873#M20284</guid>
      <dc:creator>Bjoern_K</dc:creator>
      <dc:date>2020-12-18T16:58:48Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105880#M20285</link>
      <description>&lt;P&gt;The CRL in general should not be accessible to the world, only to the relevant gateways that need it (basically any gateway you manage and for any VPN gateways with where the ICA certificate is used).&lt;BR /&gt;And, for reasons discussed above, it has to be over HTTP.&lt;BR /&gt;Generally this access is permitted with implied rules but additional segmentation/access control rules for your management may be required.&lt;/P&gt;</description>
      <pubDate>Fri, 18 Dec 2020 17:51:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/105880#M20285</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2020-12-18T17:51:10Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/106012#M20310</link>
      <description>&lt;P&gt;Thanks for the answer, PhoneBoy, but that still does not answer my original question. While the CRL might need to be distributed over HTTP, this doesn't justify why a CA certficiate is distributed over HTTP and the associated security risks. Why not distribute the CA certificate over HTTPS on another port?&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 07:36:52 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/106012#M20310</guid>
      <dc:creator>Bjoern_K</dc:creator>
      <dc:date>2020-12-21T07:36:52Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/106052#M20318</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/55366"&gt;@Bjoern_K&lt;/a&gt;&amp;nbsp;,&lt;/P&gt;
&lt;P&gt;&lt;BR /&gt;This will become a bootstrap issue. Which certificate should be used for the https site? The same as the one you're about to download? In that case - how can you trust it before downloading it. You need to start with something.&lt;/P&gt;
&lt;P&gt;On the internet, you get a pre-installed package of trusted CAs; when it comes to your own private management - you don't have that privilege until you download that CA's certificate and install it.&lt;/P&gt;
&lt;P&gt;Ethan&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 16:01:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/106052#M20318</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2020-12-21T16:01:05Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/106055#M20320</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/10237"&gt;@Ethan_Schorer&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;good point. Of course you would need a certificate from a trusted CA and this is of course what I assumed . But I can see how this would not be practical here. However, this doesn't remedy the security issue that comes with distributing the CA certificate over HTTP. While I can see how this is a convenient solution in practice, the security risk remains. Could you please adress the issue I described?&lt;/P&gt;&lt;P&gt;Why not advocate for a more secure way of distributing the CA certificate? For example by letting the admins install them instead of distributing them over this insecure channel. This would mitigate the risk considerably - assuming that you trust your admins... but if you don't do that, you have bigger problems.&lt;/P&gt;&lt;P&gt;Is there a way of removing this web portal from this port without negatively effecting the functionality of your product? (again, I don't have detailed knowledge about the product)&lt;/P&gt;&lt;P&gt;While the attack vector might be arguably small (as long as the portal isn't available over the internet, which it was in the case of my client), users should be able to decide whether they want to take this risk or not in my opinion.&lt;/P&gt;&lt;P&gt;Thanks.&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 16:20:49 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/106055#M20320</guid>
      <dc:creator>Bjoern_K</dc:creator>
      <dc:date>2020-12-21T16:20:49Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/106056#M20321</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/55366"&gt;@Bjoern_K&lt;/a&gt; ,&lt;/P&gt;
&lt;P&gt;Let me look into that.&lt;/P&gt;
&lt;P&gt;Ethan&lt;/P&gt;</description>
      <pubDate>Mon, 21 Dec 2020 16:24:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/106056#M20321</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2020-12-21T16:24:38Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/108087#M20615</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/10237"&gt;@Ethan_Schorer&lt;/a&gt;,&lt;/P&gt;&lt;P&gt;I'm still interested in the original question, did you find something out about this topic in the mean time?&lt;/P&gt;&lt;P&gt;Thanks!&lt;/P&gt;</description>
      <pubDate>Mon, 18 Jan 2021 11:32:20 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/108087#M20615</guid>
      <dc:creator>Bjoern_K</dc:creator>
      <dc:date>2021-01-18T11:32:20Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/109573#M20784</link>
      <description>&lt;P&gt;Hello gentleman,&lt;BR /&gt;&lt;BR /&gt;I also am very interested in the scenario here and did read your posts as I have the exact same situation with a client assessment. I also not have been sure how I should rate this finding and if it it indeed poses a security risk. My thoughts have been similar to&amp;nbsp;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/55366"&gt;@Bjoern_K&lt;/a&gt;'s.&amp;nbsp;&lt;BR /&gt;But I also am very interested in an update on the subject and what the best practice is to protect that Port/Webserver.&lt;BR /&gt;&lt;BR /&gt;Thank you all very much for the clarifications!&lt;/P&gt;</description>
      <pubDate>Tue, 02 Feb 2021 14:37:38 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/109573#M20784</guid>
      <dc:creator>x13</dc:creator>
      <dc:date>2021-02-02T14:37:38Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/110117#M20852</link>
      <description>&lt;P&gt;Great to see that someone else is interested in this issue as well! I would also still appreciate an update on this.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 07:02:42 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/110117#M20852</guid>
      <dc:creator>Bjoern_K</dc:creator>
      <dc:date>2021-02-08T07:02:42Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/110186#M20861</link>
      <description>&lt;P&gt;Hi,&lt;BR /&gt;Sorry for not replying earlier on this.&lt;/P&gt;
&lt;P&gt;I understand the issue and we plan to attend it.&lt;/P&gt;
&lt;P&gt;This "web site" is there mainly for CRL fetching which is why it is accessible externally and in clear HTTP. That will remain this way.&lt;/P&gt;
&lt;P&gt;With time, we added the Internal CAs public key for downloading in order to make it easier for administrators to distribute it to their end-users - this we plan to move to an internal-only port.&lt;/P&gt;
&lt;P&gt;In the meantime, until the fix is out, if you don't want your end-users to download the public key from there - then supply it to them some other way. End-users won't access this page unless they're directed to it.&lt;/P&gt;
&lt;P&gt;Best regards,&lt;/P&gt;
&lt;P&gt;Ethan&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 13:26:21 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/110186#M20861</guid>
      <dc:creator>Ethan_Schorer</dc:creator>
      <dc:date>2021-02-08T13:26:21Z</dc:date>
    </item>
    <item>
      <title>Re: HowTo: React on Check Point Information Disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/110200#M20866</link>
      <description>&lt;P&gt;Hi Ethan,&lt;/P&gt;&lt;P&gt;sorry to be so blunt, but the statement "&lt;EM&gt;this "web site" is there mainly for CRL fetching which is why it is accessible externally and in clear HTTP.&lt;/EM&gt;" is clearly false. Maybe the port is used for this as well, but the website itself is only used to distribute the certificates.&lt;/P&gt;&lt;P&gt;Moving this portal to an internal-only port only mitigates the risk from an outside attacker. An inside attacker would still be able to exploit it.&lt;/P&gt;&lt;P&gt;"&lt;EM&gt;End users won't acces this page unless they're directed to it&lt;/EM&gt;" - exactly this is the problem. This page could easily be used in a Social Engineering scenario.&lt;/P&gt;&lt;P&gt;Why not add a possiblity to completely turn off this page? (I actually think it should be the other way around - the page should be deactivated on default and if you want to activate it, the users should be warned about the security risk involved)&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;Björn&lt;/P&gt;</description>
      <pubDate>Mon, 08 Feb 2021 14:37:27 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/HowTo-React-on-Check-Point-Information-Disclosure/m-p/110200#M20866</guid>
      <dc:creator>Bjoern_K</dc:creator>
      <dc:date>2021-02-08T14:37:27Z</dc:date>
    </item>
  </channel>
</rss>

