- Products
- Learn
- Local User Groups
- Partners
- More
Quantum Spark Management Unleashed!
Check Point Named Leader
2025 Gartner® Magic Quadrant™ for Hybrid Mesh Firewall
HTTPS Inspection
Help us to understand your needs better
CheckMates Go:
SharePoint CVEs and More!
1100/1400/1500 are using DNSmasq in version 2.78, which is vulnerable to DNSpooQ: https://www.jsof-tech.com/disclosures/dnspooq/
Could anybody confirm this? And if yes, when will there be a fix?
I can only find sk35484 Check Point response to DNS poisoning vulnerability CVE-2008-1447 stating:
On July 8, 2008 CERT announced a new DNS cache poisoning technique that exploits the fact that DNS servers send requests with non random source ports.
Check Point products are not vulnerable to this attack for the following reasons:
cough cough cough
[Expert@1500]# netstat -anp | grep dnsmasq
tcp 0 0 0.0.0.0:53 0.0.0.0:* LISTEN 4190/dnsmasq
tcp 0 0 :::53 :::* LISTEN 4190/dnsmasq
udp 0 0 0.0.0.0:53 0.0.0.0:* 4190/dnsmasq
udp 0 0 :::53 :::* 4190/dnsmasq
unix 2 [ ] DGRAM 1861 4190/dnsmasq
[Expert@1500]#
That's an old SK that doesn't reference this particular issue.
In any case, we're not vulnerable because:
The second set of issues does not requie DNSSEC:
JSOF also reported vulnerabilities in DNS response validation that can result in DNS cache poisoning.
Seems like these one could be an issue.
To the best of my knowledge, we are not vulnerable to any of the issues mentioned.
Could you please check with R&D as the version on the appliance is 2.78 and the first unaffected is 2.83.
Thank you.
When we say “not vulnerable” that generally means one of two things:
I recommend a TAC case if you would like a more formal answer.
I opened a TAC case, let's see what they will answer.
According to https://www.jsof-tech.com/wp-content/uploads/2021/01/DNSpooq-Technical-WP.pdf, the SMB use -c 0 on dnsmasq and thereby disable the cache and avoid the attack by this
The TAC confirmed, that it will be updated in the next GA Release.
Further Update from R&D, the devices are vunerable in curtain circumstances and that is why there will be an update .
Thanks for staying on top of this.
That is a different bug from 13 years ago.
I know - i can already read 8) and told you above i have only found something about the grandpa of these CVEs.
Sure but once again, these are similar but really old.
Once again: I know. I have cited what i did find and not claimed to have found something about your issue. And i also know
sk35623: Hide NAT cancels DNS source port randomization.
sk35624: Preventing DNS cache poisoning when reusing source ports.
Yes but unreletant bugs are not useful to answer the question 🙂
Did you ever read these "unreletant" SKs ? Silently shaking my head...
We're all trying to help out.
Let's keep it friendly 🙂
Possible we’ve patched this already, I’ll check.
Or you know since its GPL code you could give access to customers so they could see for themselves.
See for themselves ? How ? All customers i know of are absolutely GPL code blind 8). I would suggest that CP answers the question once for all instead.
In some scenarios, SMB 1500 devices can be vulnerable to DNSPooQ on internal (LAN, Wi-Fi) networks.
The issue is resolved in R80.20.20 Build 992001869
http://downloads.checkpoint.com/fileserver/ID/112434/FILE/fw1_vx_dep_R80_992001869_20.img
In some scenarios, SMB 700 and 1400 devices can be vulnerable to DNSPooQ on internal (LAN, Wi-Fi) networks.
The issue is resolved in R77.20.87 Jumbo Hotfix build 990173083
http://downloads.checkpoint.com/fileserver/ID/112528/FILE/fw1_sx_dep_R77_990173083_20.img
In some scenarios, SMB 1200R devices can be vulnerable to DNSPooQ on internal (LAN, Wi-Fi) networks.
The issue is resolved in R77.20.81 Jumbo Hotfix build 990172611
http://downloads.checkpoint.com/fileserver/ID/112500/FILE/fw1_ind_dep_R77_990172611_20.img
Will a CVE be posted if it hasn't already been?
any update to the 1100?
in progress
Thanks
TAC told me there will be no new build for the 1100, but you wrote there will be one?
Hi Steffen
Leaderboard
Epsum factorial non deposit quid pro quo hic escorol.
User | Count |
---|---|
12 | |
4 | |
3 | |
3 | |
3 | |
3 | |
2 | |
2 | |
2 | |
1 |
Wed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAWed 17 Sep 2025 @ 03:00 PM (CEST)
Securing Applications with Check Point and AWS: A Unified WAF-as-a-Service Approach - EMEAThu 18 Sep 2025 @ 03:00 PM (CEST)
Bridge the Unmanaged Device Gap with Enterprise Browser - EMEAThu 18 Sep 2025 @ 02:00 PM (EDT)
Bridge the Unmanaged Device Gap with Enterprise Browser - AmericasMon 22 Sep 2025 @ 03:00 PM (CEST)
Defending Hyperconnected AI-Driven Networks with Hybrid Mesh Security EMEAAbout CheckMates
Learn Check Point
Advanced Learning
YOU DESERVE THE BEST SECURITY