CVE-2005-4093

N/A Unknown
Published: December 08, 2005 Modified: April 16, 2026
View on NVD

Description

Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/17837
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/23395
Source: cve@mitre.org
Vendor Advisory
http://www.vupen.com/english/advisories/2005/2808
Source: cve@mitre.org
Vendor Advisory
http://secunia.com/advisories/17837
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/23395
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1015326
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/15757
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us.debian.org/security/2006/dsa-1237
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2005/2808
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory

18 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
4.3%
89th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

checkpoint