Unrated severityNVD Advisory· Published Jul 9, 2001· Updated Apr 16, 2026
CVE-2001-1158
CVE-2001-1158
Description
Check Point VPN-1/FireWall-1 4.1 base.def contains a default macro, accept_fw1_rdp, which can allow remote attackers to bypass intended restrictions with forged RDP (internal protocol) headers to UDP port 259 of arbitrary hosts.
Affected products
3cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*+ 2 more
- cpe:2.3:a:checkpoint:firewall-1:4.1:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:firewall-1:4.1_build_41439:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:firewall-1:4.1:sp2:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- archives.neohapsis.com/archives/bugtraq/2001-07/0128.htmlnvdPatchVendor Advisory
- www.securityfocus.com/bid/2952nvdPatchVendor Advisory
- www.cert.org/advisories/CA-2001-17.htmlnvdUS Government Resource
- www.kb.cert.org/vuls/id/310295nvdUS Government Resource
- ciac.llnl.gov/ciac/bulletins/l-109.shtmlnvd
- online.securityfocus.com/cgi-bin/archive.plnvd
- www.checkpoint.com/techsupport/alerts/rdp.htmlnvd
- www.osvdb.org/1884nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/6815nvd
News mentions
0No linked articles in our index yet.