Unrated severityNVD Advisory· Published Dec 8, 2005· Updated Apr 16, 2026
CVE-2005-4093
CVE-2005-4093
Description
Check Point VPN-1 SecureClient NG with Application Intelligence R56, NG FP1, 4.0, and 4.1 allows remote attackers to bypass security policies by modifying the local copy of the local.scv policy file after it has been downloaded from the VPN Endpoint.
Affected products
4cpe:2.3:a:checkpoint:secureclient_ng:*:*:fp1:*:*:*:*:*+ 1 more
- cpe:2.3:a:checkpoint:secureclient_ng:*:*:fp1:*:*:*:*:*
- cpe:2.3:a:checkpoint:secureclient_ng:r56:*:*:*:*:*:*:*
cpe:2.3:a:checkpoint:vpn-1_secureclient:4.0:*:*:*:*:*:*:*+ 1 more
- cpe:2.3:a:checkpoint:vpn-1_secureclient:4.0:*:*:*:*:*:*:*
- cpe:2.3:a:checkpoint:vpn-1_secureclient:4.1:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
9- secunia.com/advisories/17837nvdVendor Advisory
- secunia.com/advisories/23395nvdVendor Advisory
- www.vupen.com/english/advisories/2005/2808nvdVendor Advisory
- lists.grok.org.uk/pipermail/full-disclosure/2005-December/039634.htmlnvd
- securitytracker.com/idnvd
- www.mail-archive.com/swinog%40lists.swinog.ch/msg00798.htmlnvd
- www.mail-archive.com/swinog%40lists.swinog.ch/msg00799.htmlnvd
- www.securityfocus.com/bid/15757nvd
- www.us.debian.org/security/2006/dsa-1237nvd
News mentions
0No linked articles in our index yet.