- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Introducing Check Point Quantum Spark 2500:
Smarter Security, Faster Connectivity, and Simpler MSP Management!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
Hello Everyone,
Is there any news on the CVE-2021-3449 in Check Point products?
https://www.openssl.org/news/vulnerabilities.html
Regards,
Not 100% but I believe Open SSL was updated to v1.1.1i in the following:
R81 JHFA13
R80.40 JHFA100
Not aware of another fix so it sounds like Checkpoint may included this in a later fix after they confirm Checkpoint appliances are affected.
Fixed in OpenSSL 1.1.1k - Affected 1.1.1-1.1.1j
Sounds like Checkpoint need to release a new Jumbo, may I suggest raising a TAC case to help speed this up.
Relevant sk where should be all OpenSSL CVEs is not yet updated:
We are planning to fix it in the upcoming Jumbo. If you need immediate targeted fix, please open a case with TAC.
Will this be integrated into JHF100 FOR r80.40 as this is still ongoing take? and equal in JHFA23 for R81?
Still ongoing for both. More details can be available from TAC through a case.
Hi all,
We just updated sk92447, we will keep updating it once we complete the analysis for CVE-2021-3449
Hello,
2 weeks and still no news about CVE-2021-3449?
Regards,
When will the analysis phase be completed? Consider Checkpoint are a Security vendor its pretty poor show that this is taking so long to either fix or confirm there product is not vulnerable.
More interesting question, if a vendor device is compromised, after the vendor has acknowledge said issue but not yet resolved it, could they be liable for any loss of earnings or reputation damage...interest scenario to think of.
Is there a legal grace period in which the vendor would have to analysis, and release a statement, which would cover them and customers?
https://supportcontent.checkpoint.com/solutions?id=sk172983
statement released
There is an official statement now available: Response to OpenSSL CVE-2021-3449
Just to be sure: Gaia embedded is not vulnerable?
Thanks All.
Gaia embedded is not vulnerable
R80.20 based versions are not vulnerable
Take 102 has now been release which addresses this CVE
Do you mean R80.40 or R80.20? Was this a typo?
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
10 | |
7 | |
6 | |
5 | |
5 | |
5 | |
5 | |
4 | |
4 | |
4 |
Wed 10 Sep 2025 @ 11:00 AM (CEST)
Effortless Web Application & API Security with AI-Powered WAF, an intro to CloudGuard WAFWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationWed 10 Sep 2025 @ 11:00 AM (EDT)
Quantum Spark Management Unleashed: Hands-On TechTalk for MSPs Managing SMB NetworksFri 12 Sep 2025 @ 10:00 AM (CEST)
CheckMates Live Netherlands - Sessie 38: Harmony Email & CollaborationAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY