<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerability on CheckPoint Banner disclosure in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22419#M4313</link>
    <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We provide no way to remove the banner and as noted in SK, it's expected behavior:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99076" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99076"&gt;Server disclosure on port 18264&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even if we removed the banner, there are less obvious ways to tell a gateway is Check Point, for example the various ports we use:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk52421&amp;amp;partition=Advanced&amp;amp;product=All%22" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk52421&amp;amp;partition=Advanced&amp;amp;product=All%22"&gt;Ports used by Check Point software&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
    <pubDate>Thu, 11 Jan 2018 14:46:35 GMT</pubDate>
    <dc:creator>PhoneBoy</dc:creator>
    <dc:date>2018-01-11T14:46:35Z</dc:date>
    <item>
      <title>Vulnerability on CheckPoint Banner disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22413#M4307</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;I have a customer reporting on VA report with below:&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Banner Disclosure: Fingerprinting&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Per their&amp;nbsp;VA scan - Outside Scan done on External IP of Firewall on Port:443&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;HTTP/1.0 404 Not found&lt;BR /&gt;Date: Thu, 21 Oct 2017 17:17:50 GMT&lt;BR /&gt;Server: &lt;STRONG&gt;Check Point SVN Foundation&lt;/STRONG&gt;&lt;BR /&gt;Conten-Type: text/html&lt;BR /&gt;X-UA-Compatible: IE-EmulateIE7&lt;BR /&gt;Conenction: Close&lt;BR /&gt;X-Frame-Options: SAMEORIGIN&lt;BR /&gt;Last-Modified: Sat, 17 Jan 2015 19:00:00 GMT&lt;BR /&gt;Content-Length: 204&lt;/P&gt;&lt;P&gt;&amp;lt;HTML&amp;gt;&lt;BR /&gt;&amp;lt;HEAD&amp;gt;&lt;BR /&gt;&amp;lt;TITLE&amp;gt;404 File Not Found &amp;gt;/TITLE&amp;gt;&lt;BR /&gt;&amp;lt;/HEAD&amp;gt;&lt;/P&gt;&lt;P&gt;+++++++++++++++++++++++++++++++++++++++++++++++++++++++++++&lt;/P&gt;&lt;P&gt;Per above, it means that External person knows that the organisation is Protected by CheckPoint Firewall and can focus on some accurate methods inorder to enter internal networks.&lt;/P&gt;&lt;P&gt;So customer would like to make the Banner display: CheckPOint SVN Foundation to be masked.&lt;/P&gt;&lt;P&gt;Is there any possibility?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Note: Customer do not have IPS Blade&amp;nbsp;&lt;/P&gt;&lt;P&gt;Scan has done using &lt;STRONG&gt;Burp Suite Tool v1.7.03 Free&amp;nbsp;edition&lt;/STRONG&gt;&lt;/P&gt;&lt;P&gt;Any response would be helpful.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Prabulingam.N&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 14:15:57 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22413#M4307</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2018-01-10T14:15:57Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability on CheckPoint Banner disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22414#M4308</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Are you using any features that require the gateway to be accessed on port 443 externally?&lt;/P&gt;&lt;P&gt;If not, you might want to prevent access to it entirely.&lt;/P&gt;&lt;P&gt;See:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105740" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk105740"&gt;HTTP and HTTPS requests to external interfaces create implied rule 0 accepts in SmartView Tracker&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;As far as I know, there is no way to change the banner in this situation.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 17:12:44 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22414#M4308</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-10T17:12:44Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability on CheckPoint Banner disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22415#M4309</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;I would also point out that I have yet to find a way to make a gateway invisible on port 43.&amp;nbsp; Even with implied rules off, and an explicit rule blocking port 43, it still shows up in scans.&amp;nbsp; Traffic to 43 does get BLOCKED, but the port is still VISIBLE.&amp;nbsp; Why the daemon is responding in any way when I've written an explicit stealth rule is beyond me and something I wish Check Point would fix. (Why is it sending an ACK? The SYN should die in the kernel.) It's a security device - we need to have the ability to make any port completely dark.&amp;nbsp; Yeah, I know, the Big Boys want "ease of use."&amp;nbsp; But, seriously, we should be able to turn a firewall into a black hole to any scan on any interface.&amp;nbsp; Customer do NOT like it when their firewall shows up on a scan and they can't make it go away. (I've run into this on both R77 and R80)&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Wed, 10 Jan 2018 23:53:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22415#M4309</guid>
      <dc:creator>Michael_Lawrenc</dc:creator>
      <dc:date>2018-01-10T23:53:24Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability on CheckPoint Banner disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22416#M4310</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;The SK I linked to earlier should resolve that issue.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2018 00:15:11 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22416#M4310</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-11T00:15:11Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability on CheckPoint Banner disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22417#M4311</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Your firewall is also a router. So if there is any server at all visible behind the firewall you will be able to detect the firewall.&lt;/P&gt;&lt;P&gt;Just like you can map the Chinese wall on internet for HTTP traffic.&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2018 08:19:02 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22417#M4311</guid>
      <dc:creator>Hugo_vd_Kooij</dc:creator>
      <dc:date>2018-01-11T08:19:02Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability on CheckPoint Banner disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22418#M4312</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Yes, it is.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Since customer had an internal server we have steps inorder to remove those hearders of Server.&lt;/P&gt;&lt;P&gt;But CheckPoint SVN header cannot be removed?&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Prabulingam.N&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2018 11:08:53 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22418#M4312</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2018-01-11T11:08:53Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability on CheckPoint Banner disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22419#M4313</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;We provide no way to remove the banner and as noted in SK, it's expected behavior:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99076" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk99076"&gt;Server disclosure on port 18264&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Even if we removed the banner, there are less obvious ways to tell a gateway is Check Point, for example the various ports we use:&amp;nbsp;&lt;A class="link-titled" href="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk52421&amp;amp;partition=Advanced&amp;amp;product=All%22" title="https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&amp;amp;solutionid=sk52421&amp;amp;partition=Advanced&amp;amp;product=All%22"&gt;Ports used by Check Point software&lt;/A&gt;&amp;nbsp;&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Thu, 11 Jan 2018 14:46:35 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22419#M4313</guid>
      <dc:creator>PhoneBoy</dc:creator>
      <dc:date>2018-01-11T14:46:35Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerability on CheckPoint Banner disclosure</title>
      <link>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22420#M4314</link>
      <description>&lt;HTML&gt;&lt;HEAD&gt;&lt;/HEAD&gt;&lt;BODY&gt;&lt;P&gt;Dear Dameon,&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Thanks for your inputs.&lt;/P&gt;&lt;P&gt;&lt;/P&gt;&lt;P&gt;Regards, Prabulingam.N&lt;/P&gt;&lt;/BODY&gt;&lt;/HTML&gt;</description>
      <pubDate>Sat, 13 Jan 2018 16:53:05 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/Vulnerability-on-CheckPoint-Banner-disclosure/m-p/22420#M4314</guid>
      <dc:creator>Prabulingam_N1</dc:creator>
      <dc:date>2018-01-13T16:53:05Z</dc:date>
    </item>
  </channel>
</rss>

