Create a Post
cancel
Showing results for 
Search instead for 
Did you mean: 
Blason_R
MVP Gold
MVP Gold

CVE-2025-68615 Net-SNMP snmptrapd crash

Hi Team,

It appears that CP is utilizing net-snmp, specifically version 5.8.x. Could someone verify whether this vulnerability is relevant to CP models? Given that CVSS3.1 rates it as 9.8 Critical, I am eager for a response from CP.

```

rpm -qa | grep snmp
net-snmp-libs-5.8-7.cp997000091.2.i686
net-snmp-5.8-7.cp997000091.2.i686
net-snmp-utils-5.8-7.cp997000091.2.i686
net-snmp-sysvinit-5.8-7.cp997000091.2.i686
os_net_snmp_cpis-0.1-cp997000080.i686
net-snmp-agent-libs-5.8-7.cp997000091.2.i686
os_net_snmp_config-0.1-cp997000005.i686

```

Thanks and Regards,
Blason R
CCSA,CCSE,CCCS
0 Kudos
4 Replies
Chris_Atkinson
MVP Platinum CHKP MVP Platinum CHKP
MVP Platinum CHKP

Best to raise a support case with TAC for an official answer and flag with your SE if not already.

CCSM R77/R80/ELITE
Blason_R
MVP Gold
MVP Gold

Indeed, to be honest, the community is much faster than TAC. 😉

In any case, I have already contacted the local SE.

Thanks

Thanks and Regards,
Blason R
CCSA,CCSE,CCCS
0 Kudos
_Val_
Admin
Admin

The correct way to get a security vulnerability response from Check Point is to open a ticket with TAC.

Responses in the community are not considered official unless we explicitly state that they are.

0 Kudos
Blason_R
MVP Gold
MVP Gold

Yep - already opened and following up with the TAC

Thanks and Regards,
Blason R
CCSA,CCSE,CCCS
0 Kudos

Leaderboard

Epsum factorial non deposit quid pro quo hic escorol.

Upcoming Events

    CheckMates Events