CVE-2013-5635
Published Nov 30, 2013
Last updated 11 years ago
Overview
- Description
- Media Encryption EPM Explorer in Check Point Endpoint Security through E80.50 does not properly maintain the state of password failures, which makes it easier for physically proximate attackers to bypass the device-locking protection mechanism by entering password guesses within multiple Unlock.exe processes that are running simultaneously.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.3
- Impact score
- 4.9
- Exploitability score
- 3.4
- Vector string
- AV:L/AC:M/Au:N/C:P/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-255
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:checkpoint:endpoint_security:e80:-:vpn_blade:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "411DFCC1-0B71-456C-833F-4D423AAE67FF" }, { "criteria": "cpe:2.3:a:checkpoint:endpoint_security:e80.10:-:vpn_blade:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25E330FE-2BCB-4887-BDF7-5956C3ADA26A" }, { "criteria": "cpe:2.3:a:checkpoint:endpoint_security:e80.20:-:vpn_blade:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B562E6A4-65AB-4139-B497-9D3D5BE51E46" }, { "criteria": "cpe:2.3:a:checkpoint:endpoint_security:e80.30:-:vpn_blade:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5A1E05B2-8FB6-4694-8AE8-24FAEE1C632B" }, { "criteria": "cpe:2.3:a:checkpoint:endpoint_security:e80.40:-:vpn_blade:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B5E24572-22FE-442E-B9B1-FBD9BDE6148B" }, { "criteria": "cpe:2.3:a:checkpoint:endpoint_security:e80.41:-:vpn_blade:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E62DA812-690D-41D3-9408-49E33379B8F5" }, { "criteria": "cpe:2.3:a:checkpoint:endpoint_security:e80.50:-:vpn_blade:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C467BC8A-E75D-4499-80E6-C813DFDF121C" } ], "operator": "OR" } ] } ]