Hi everyone,
I am reporting a critical installation issue with the SSL Network Extender (SNX) on modern Windows 10/11 endpoints, even when served from a Management/Gateway running R81.20 with the latest Jumbo Hotfix.
Despite the Gateway being up to date, the SNX client attempts to install a version of the Check Point Virtual Network Adapter (VNA) that is being blocked by Windows Code Integrity.
Environment details:
Gateway/Management: R81.20 (Latest JHF)
Client OS: Windows 10/11 x64 (Secure Boot & Driver Signature Enforcement Enabled)
Driver in package: netvna.inf v1.2.2.0 (dated 03/14/2019)
The Technical Failure: The installation fails during the driver staging process. The setupapi.dev.log explicitly points to a revoked certificate in the netvna.cat file:
sig: {_VERIFY_FILE_SIGNATURE}
sig: Key = netvna.inf
sig: FilePath = C:\WINDOWS\System32\DriverStore\Temp\{...}\netvna.inf
sig: Catalog = C:\WINDOWS\System32\DriverStore\Temp\{...}\netvna.cat
! sig: Verifying file against specific (valid) catalog failed.
😫
Hard Revocation: The error 0x800b010c (CERT_E_REVOKED) is a terminal failure. Windows will not load this driver even if the certificate is manually added to the Trusted Root/Publisher stores, as the revocation bit is verified online via CRL/OCSP.
Legacy Binaries in R81.20: It appears the SNX components bundled with R81.20 still rely on the 2019 driver build, which carries a now-revoked signature.
Modern Security Compliance: On machines with Secure Boot enabled, there is no workaround (?) other than disabling (!) core security features (which is not an option for enterprise environments).
Question to the Community & R&D: Is there a specific SK or a separate "SNX Hotfix" for R81.20 that updates the CVPND components to include a VNA driver with a valid SHA-256 signature and a non-revoked certificate?
If the latest JHF does not address this, how can we ensure the "Thin" SNX client remains viable for Windows 11 deployments without pivoting to the full Endpoint Security VPN client?
Thanks in advance
Mr. Dreyfuss