<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Assistance Required: Coverage for 453 CVEs on Check Point Firewall in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/218002#M36327</link>
    <description>&lt;P&gt;I have checked the CVE list and all of them are from 2023 or older. So I am wondering how relevant are they still. Some could be still relevant but it is not the nature of the IPS product. IPS protections are made to make a vulnerable system more secure. At some point you have to fix this security issue on the system itself and not forever count on the firewall to do this job. Either the vendor of product has to solve the issue or you have to move on with different product / version etc.&lt;/P&gt;
&lt;P&gt;Second what I notice is that there are many 'Siemens' related CVE's, so this question should be asked and checked with Siemens. You have to let the vendor know what products you are using and what software and if this CVE is still relevant. Then you know you do not need the IPS protections at all. If the products you run are still supported and updated then most of the times all the old CVE's are already solved.&lt;/P&gt;
&lt;P&gt;Also what PhoneBoy said, if you do not run HTTPS inspection (both ways! in and outbound) you have little chance to prevent or detect with IPS if it is encrypted.&lt;/P&gt;</description>
    <pubDate>Tue, 18 Jun 2024 19:00:07 GMT</pubDate>
    <dc:creator>Lesley</dc:creator>
    <dc:date>2024-06-18T19:00:07Z</dc:date>
    <item>
      <title>Assistance Required: Coverage for 453 CVEs on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217495#M36260</link>
      <description>&lt;P&gt;Hi Community Team,&lt;/P&gt;
&lt;P&gt;Check Point firewall for one of the customers, which is used for OT security to analyze traffic and protect the network. Recently, the VAPT (Vulnerability Assessment and Penetration Testing) team provided a list of 453 CVEs, requesting confirmation on whether the patches are available for these vulnerabilities.&lt;/P&gt;
&lt;P&gt;Upon reviewing the Check Point SmartConsole GUI, I found that only 13 out of the 453 CVEs are explicitly listed. Our IPS, Anti-Bot, and Anti-Virus databases are up-to-date, as confirmed by our recent checks.&lt;/P&gt;
&lt;P&gt;Given the importance of ensuring comprehensive protection for our customer's network, I need some assistance and clarification from the community:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;&lt;STRONG&gt;Coverage of Remaining CVEs&lt;/STRONG&gt;: Are the remaining 441 CVEs implicitly covered by generic protections, Anti-Bot, Anti-Virus, or other mechanisms within the Check Point firewall? If yes, how can I verify this coverage?&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Mitigation Steps&lt;/STRONG&gt;: If specific patches or protections are not available for some CVEs, what steps can we take to mitigate these vulnerabilities effectively?&lt;/LI&gt;
&lt;LI&gt;&lt;STRONG&gt;Documentation and Details&lt;/STRONG&gt;: Can anyone provide additional details or documentation on how these CVEs are addressed by Check Point?&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;I have verified that all threat prevention components (IPS, Anti-Bot, Anti-Virus) are up-to-date. &lt;STRONG&gt;Attached is the list of 453 CVEs for reference&lt;/STRONG&gt;.(I Bold the line which is displayed in the smartconsole)&lt;/P&gt;
&lt;P&gt;Any guidance or assistance from the community would be greatly appreciated, as this is critical to maintaining a secure environment for our customer.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;/P&gt;
&lt;P&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2024 07:17:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217495#M36260</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2024-06-14T07:17:30Z</dc:date>
    </item>
    <item>
      <title>Re: Assistance Required: Coverage for 453 CVEs on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217580#M36278</link>
      <description>&lt;P&gt;IPS signatures are only relevant when the communication necessary to exploit it occurs over an IP network.&lt;BR /&gt;That would eliminate a few of these.&lt;/P&gt;
&lt;P&gt;I expect we'll probably be able to mitigate these with a combination with the Optimized profile and possibly HTTPS Inspection.&lt;BR /&gt;The best way to confirm would be through empirical testing and/or by engaging with your local Check Point office.&lt;/P&gt;</description>
      <pubDate>Fri, 14 Jun 2024 22:38:06 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217580#M36278</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-14T22:38:06Z</dc:date>
    </item>
    <item>
      <title>Re: Assistance Required: Coverage for 453 CVEs on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217887#M36313</link>
      <description>&lt;P&gt;Hi &lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/7"&gt;@PhoneBoy&lt;/a&gt; Sir,&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thank you for your response regarding the relevance of IPS signatures for specific CVEs. To proceed further, we need clarification on the availability of the list of CVEs we provided in the Check Point database.&lt;/P&gt;
&lt;P&gt;&lt;STRONG&gt;Our primary concern is to validate if the 400+ CVEs listed, which are published by the National Vulnerability Database (NVD), are covered by Check Point's IPS protections or if corresponding patches are available in the Check Point database.&lt;/STRONG&gt;&lt;/P&gt;
&lt;P&gt;We have noted your points on IPS signatures being relevant only for vulnerabilities that can be exploited over an IP network, and we understand that this might exclude some CVEs from requiring IPS protection. However, our goal is to ensure comprehensive protection by verifying the following:&lt;/P&gt;
&lt;OL&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Coverage in Check Point Database&lt;/STRONG&gt;: Could you please confirm whether the 400+ CVEs we submitted are included in the Check Point IPS protections or if patches for these vulnerabilities are available in the Check Point database?&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Detailed Information on Exclusions&lt;/STRONG&gt;: For CVEs that are excluded from IPS protection due to the nature of their exploitation not involving IP network communication, could you provide a detailed list of these CVEs? This will help us understand which vulnerabilities we need to address separately.&lt;/P&gt;
&lt;/LI&gt;
&lt;LI&gt;
&lt;P&gt;&lt;STRONG&gt;Current Configurations&lt;/STRONG&gt;: We are already using the optimized profile along with application and URL filtering. However, we have not implemented HTTPS inspection. Could you provide specific guidance on whether enabling HTTPS inspection is necessary for mitigating the CVEs in question?&lt;/P&gt;
&lt;/LI&gt;
&lt;/OL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards&lt;BR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/25509"&gt;@Chinmaya_Naik&lt;/a&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 05:31:30 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217887#M36313</guid>
      <dc:creator>Chinmaya_Naik</dc:creator>
      <dc:date>2024-06-18T05:31:30Z</dc:date>
    </item>
    <item>
      <title>Re: Assistance Required: Coverage for 453 CVEs on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217973#M36321</link>
      <description>&lt;P&gt;Please consult with your local Check Point office for assistance in answering these questions.&lt;/P&gt;
&lt;P&gt;In general, IPS will work better with HTTPS Inspection enabled.&lt;BR /&gt;However, if the customer environment doesn't use HTTPS at all, it's not relevant.&lt;BR /&gt;A related question: is the customer even using the applications specified in these CVEs?&lt;BR /&gt;If not, why is a protection a CVE for something not even in use relevant?&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 15:09:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217973#M36321</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2024-06-18T15:09:29Z</dc:date>
    </item>
    <item>
      <title>Re: Assistance Required: Coverage for 453 CVEs on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217985#M36323</link>
      <description>&lt;P&gt;Me, personally, if customer had a question like this, I would open TAC case to get an official response&lt;/P&gt;
&lt;P&gt;Just my opinion.&lt;/P&gt;
&lt;P&gt;Andy&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 16:09:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/217985#M36323</guid>
      <dc:creator>the_rock</dc:creator>
      <dc:date>2024-06-18T16:09:53Z</dc:date>
    </item>
    <item>
      <title>Re: Assistance Required: Coverage for 453 CVEs on Check Point Firewall</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/218002#M36327</link>
      <description>&lt;P&gt;I have checked the CVE list and all of them are from 2023 or older. So I am wondering how relevant are they still. Some could be still relevant but it is not the nature of the IPS product. IPS protections are made to make a vulnerable system more secure. At some point you have to fix this security issue on the system itself and not forever count on the firewall to do this job. Either the vendor of product has to solve the issue or you have to move on with different product / version etc.&lt;/P&gt;
&lt;P&gt;Second what I notice is that there are many 'Siemens' related CVE's, so this question should be asked and checked with Siemens. You have to let the vendor know what products you are using and what software and if this CVE is still relevant. Then you know you do not need the IPS protections at all. If the products you run are still supported and updated then most of the times all the old CVE's are already solved.&lt;/P&gt;
&lt;P&gt;Also what PhoneBoy said, if you do not run HTTPS inspection (both ways! in and outbound) you have little chance to prevent or detect with IPS if it is encrypted.&lt;/P&gt;</description>
      <pubDate>Tue, 18 Jun 2024 19:00:07 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Assistance-Required-Coverage-for-453-CVEs-on-Check-Point/m-p/218002#M36327</guid>
      <dc:creator>Lesley</dc:creator>
      <dc:date>2024-06-18T19:00:07Z</dc:date>
    </item>
  </channel>
</rss>

