- Products
- Learn
- Local User Groups
- Partners
- More
AI Security Masters
E1: How AI is Reshaping Our World
MVP 2026: Submissions
Are Now Open!
What's New in R82.10?
Watch NowOverlap in Security Validation
Help us to understand your needs better
CheckMates Go:
Maestro Madness
Hello,
I have a Firewall Cluster, version R81.10.
Currently the Cluster has the IPS blade active.
Our Cybersecurity area has made the detection of a new signature, which require to know if this signature "impacts" or not to any asset of our company.
I have reviewed in the IPS Protections option from the SmartConsole, the signature that was reported to me, which is:
Vulnerability in Check Point (CVE-2023-34460) (CVSS Score v3: Undefined).
But you will notice in the attached image, that apparently, Checkpoint, does not have it included in its database, or I'm checking wrong????
What kind of action can be taken in this case?
Currently I have the following version of IPS signatures installed in my Cluster Firewalls.
Just to clarify the doubt, the signatures that I find with the "PREVENT" action in Checkpoint's database, does it mean that Checkpoint "blocks" this type of traffic?
Prevent, is it related to the action of BLOCKING all traffic? Or is it not always like that?
Thanks for your comments.
Generally only when POC code is available can a protection be created.
If this is critical for you please work with your local CP SE to track it.
'Prevent' does what it says but there can be some dependencies depending on the type of threat/traffic e.g. HTTPS inspection
You need to update your SmartConsole software. In some early releases you were not allowed to search by CVE number, however this was fixed in later releases. From my IPS/AV/ABOT Immersion Course (which was just updated for R81.20) discussing the searching of IPS Protections:
Hello,
Is it possible to "work" with the SmartConsole R81.20, to access my SMS which is in version R81.10?
Or am I forced to update the SMS Gaia to R81.20?
Greetings.
Alternately you can also search your CVE here: https://advisories.checkpoint.com/advisories/
Hello,
I checked my CVE on that page, and it doesn't appear in "LIST" either.
It is recommended to work with the SE, isn't it?
Cheers.
The SE can make a request internally, again depending on POC code availability.
A cursory read of CVE-2023-34460 suggests the issue is in a piece of software used to build other software.
I fail to see how any network-based IPS would protect against this vulnerability.
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
| User | Count |
|---|---|
| 11 | |
| 9 | |
| 9 | |
| 8 | |
| 6 | |
| 3 | |
| 2 | |
| 2 | |
| 2 | |
| 1 |
Tue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsTue 16 Dec 2025 @ 05:00 PM (CET)
Under the Hood: CloudGuard Network Security for Oracle Cloud - Config and Autoscaling!Thu 18 Dec 2025 @ 10:00 AM (CET)
Cloud Architect Series - Building a Hybrid Mesh Security Strategy across cloudsThu 08 Jan 2026 @ 05:00 PM (CET)
AI Security Masters Session 1: How AI is Reshaping Our WorldAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY