<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic CVE-2025-68615 Net-SNMP snmptrapd crash in General Topics</title>
    <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265903#M44736</link>
    <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;It appears that CP is utilizing net-snmp, specifically version 5.8.x. Could someone verify whether this vulnerability is relevant to CP models? Given that CVSS3.1 rates it as 9.8 Critical, I am eager for a response from CP.&lt;/P&gt;
&lt;P&gt;```&lt;/P&gt;
&lt;P&gt;rpm -qa | grep snmp&lt;BR /&gt;net-snmp-libs-5.8-7.cp997000091.2.i686&lt;BR /&gt;&lt;STRONG&gt;net-snmp-5.8-7.cp997000091.2.i686&lt;/STRONG&gt;&lt;BR /&gt;net-snmp-utils-5.8-7.cp997000091.2.i686&lt;BR /&gt;net-snmp-sysvinit-5.8-7.cp997000091.2.i686&lt;BR /&gt;os_net_snmp_cpis-0.1-cp997000080.i686&lt;BR /&gt;net-snmp-agent-libs-5.8-7.cp997000091.2.i686&lt;BR /&gt;os_net_snmp_config-0.1-cp997000005.i686&lt;/P&gt;
&lt;P&gt;```&lt;/P&gt;</description>
    <pubDate>Tue, 23 Dec 2025 11:50:22 GMT</pubDate>
    <dc:creator>Blason_R</dc:creator>
    <dc:date>2025-12-23T11:50:22Z</dc:date>
    <item>
      <title>CVE-2025-68615 Net-SNMP snmptrapd crash</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265903#M44736</link>
      <description>&lt;P&gt;Hi Team,&lt;/P&gt;
&lt;P&gt;It appears that CP is utilizing net-snmp, specifically version 5.8.x. Could someone verify whether this vulnerability is relevant to CP models? Given that CVSS3.1 rates it as 9.8 Critical, I am eager for a response from CP.&lt;/P&gt;
&lt;P&gt;```&lt;/P&gt;
&lt;P&gt;rpm -qa | grep snmp&lt;BR /&gt;net-snmp-libs-5.8-7.cp997000091.2.i686&lt;BR /&gt;&lt;STRONG&gt;net-snmp-5.8-7.cp997000091.2.i686&lt;/STRONG&gt;&lt;BR /&gt;net-snmp-utils-5.8-7.cp997000091.2.i686&lt;BR /&gt;net-snmp-sysvinit-5.8-7.cp997000091.2.i686&lt;BR /&gt;os_net_snmp_cpis-0.1-cp997000080.i686&lt;BR /&gt;net-snmp-agent-libs-5.8-7.cp997000091.2.i686&lt;BR /&gt;os_net_snmp_config-0.1-cp997000005.i686&lt;/P&gt;
&lt;P&gt;```&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 11:50:22 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265903#M44736</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2025-12-23T11:50:22Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-68615 Net-SNMP snmptrapd crash</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265904#M44737</link>
      <description>&lt;P&gt;Best to raise a support case with TAC for an official answer and flag with your SE if not already.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 11:58:12 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265904#M44737</guid>
      <dc:creator>Chris_Atkinson</dc:creator>
      <dc:date>2025-12-23T11:58:12Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-68615 Net-SNMP snmptrapd crash</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265905#M44738</link>
      <description>&lt;P&gt;Indeed, to be honest, the community is much faster than TAC. &lt;span class="lia-unicode-emoji" title=":winking_face:"&gt;😉&lt;/span&gt;&lt;/P&gt;
&lt;P&gt;In any case, I have already contacted the local SE.&lt;/P&gt;
&lt;P&gt;Thanks&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 12:05:24 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265905#M44738</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2025-12-23T12:05:24Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-68615 Net-SNMP snmptrapd crash</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265906#M44739</link>
      <description>&lt;P&gt;The correct way to get a security vulnerability response from Check Point is to open a ticket with TAC.&lt;/P&gt;
&lt;P&gt;Responses in the community are not considered official unless we explicitly state that they are.&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 12:44:14 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265906#M44739</guid>
      <dc:creator>_Val_</dc:creator>
      <dc:date>2025-12-23T12:44:14Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-68615 Net-SNMP snmptrapd crash</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265907#M44740</link>
      <description>&lt;P&gt;Yep - already opened and following up with the TAC&lt;/P&gt;</description>
      <pubDate>Tue, 23 Dec 2025 12:45:10 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/265907#M44740</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2025-12-23T12:45:10Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2025-68615 Net-SNMP snmptrapd crash</title>
      <link>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/266005#M44752</link>
      <description>&lt;P&gt;That's the official update from TAC. so for now I would consider no issues&lt;/P&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1551"&gt;@Blason_R&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Yep - already opened and following up with the TAC&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;BLOCKQUOTE&gt;&lt;HR /&gt;&lt;LI-CODE lang="markup"&gt;After thorough research, At this time, we do not have an official advisory or confirmation from Check Point specific to this CVE. However, we would like to inform you that our internal RnD teams are actively reviewing this vulnerability to assess whether it is exploitable on Check Point devices.

As of now, no definitive findings or mitigation details are available. We will create an IPS protection if it is vulnerable and push via database update. Based on the current internal assessment timelines, a further update is tentatively expected by March 2026.&lt;/LI-CODE&gt;&lt;a href="https://community.checkpoint.com/t5/user/viewprofilepage/user-id/1551"&gt;@Blason_R&lt;/a&gt;&amp;nbsp;wrote:&lt;BR /&gt;
&lt;P&gt;Yep - already opened and following up with the TAC&lt;/P&gt;
&lt;HR /&gt;&lt;/BLOCKQUOTE&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 25 Dec 2025 05:52:29 GMT</pubDate>
      <guid>https://community.checkpoint.com/t5/General-Topics/CVE-2025-68615-Net-SNMP-snmptrapd-crash/m-p/266005#M44752</guid>
      <dc:creator>Blason_R</dc:creator>
      <dc:date>2025-12-25T05:52:29Z</dc:date>
    </item>
  </channel>
</rss>

