{"api_version":"1","generated_at":"2026-04-23T02:57:09+00:00","cve":"CVE-2008-1397","urls":{"html":"https://cve.report/CVE-2008-1397","api":"https://cve.report/api/cve/CVE-2008-1397.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-1397","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-1397"},"summary":{"title":"CVE-2008-1397","description":"Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint.","state":"PUBLISHED","assigner":"mitre","published_at":"2008-03-20 00:44:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-264","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"6.5","severity":"","vector":"AV:N/AC:L/Au:S/C:P/I:P/A:P","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"}}],"references":[{"url":"http://puresecurity.com.au/index.php?action=fullnews&id=5","name":"http://puresecurity.com.au/index.php?action=fullnews&id=5","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Pure Security","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1019666","name":"http://www.securitytracker.com/id?1019666","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Check Point VPN-1 SecuRemote Lets Remote Users Deny Service - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/0953/references","name":"http://www.vupen.com/english/advisories/2008/0953/references","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf","name":"http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit"],"title":"","mime":"application/pdf","httpstatus":"200","archivestatus":"200"},{"url":"https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579","name":"https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Patch"],"title":"Support, Support Requests, Training, Documentation, and Knowledge base for Check Point products and services","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41260","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41260","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/28299","name":"http://www.securityfocus.com/bid/28299","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Check Point VPN-1 IP Address Collision Denial of Service Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.kb.cert.org/vuls/id/992585","name":"http://www.kb.cert.org/vuls/id/992585","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"],"title":"US-CERT Vulnerability Notes","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29394","name":"http://secunia.com/advisories/29394","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"CheckPoint VPN-1 IP Address Collision Security Issue - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-1397","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-1397","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"1397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkpoint","cpe5":"check_point_vpn-1_pro","cpe6":"ngx_r61","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkpoint","cpe5":"check_point_vpn-1_pro","cpe6":"ngx_r62_ga","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkpoint","cpe5":"vpn-1","cpe6":"ngx_r60","cpe7":"*","cpe8":"pro","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkpoint","cpe5":"vpn-1_firewall-1","cpe6":"ng_ai_r55","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkpoint","cpe5":"vpn-1_power_utm","cpe6":"ngx_r65_with_messaging_security","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"1397","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"checkpoint","cpe5":"vpn-1_power_utm_with_ngx","cpe6":"r65","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T08:17:34.714Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_MISC","x_transferred"],"url":"http://puresecurity.com.au/index.php?action=fullnews&id=5"},{"name":"28299","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/28299"},{"name":"VU#992585","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/992585"},{"name":"29394","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29394"},{"name":"1019666","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1019666"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf"},{"name":"ADV-2008-0953","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/0953/references"},{"name":"vpn1-ipaddress-dos(41260)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41260"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-03-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-07T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_MISC"],"url":"http://puresecurity.com.au/index.php?action=fullnews&id=5"},{"name":"28299","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/28299"},{"name":"VU#992585","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/992585"},{"name":"29394","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29394"},{"name":"1019666","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1019666"},{"tags":["x_refsource_MISC"],"url":"http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf"},{"name":"ADV-2008-0953","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/0953/references"},{"name":"vpn1-ipaddress-dos(41260)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41260"},{"tags":["x_refsource_CONFIRM"],"url":"https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-1397","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://puresecurity.com.au/index.php?action=fullnews&id=5","refsource":"MISC","url":"http://puresecurity.com.au/index.php?action=fullnews&id=5"},{"name":"28299","refsource":"BID","url":"http://www.securityfocus.com/bid/28299"},{"name":"VU#992585","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/992585"},{"name":"29394","refsource":"SECUNIA","url":"http://secunia.com/advisories/29394"},{"name":"1019666","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1019666"},{"name":"http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf","refsource":"MISC","url":"http://www.puresecurity.com.au/files/PureSecurity%20VPN-1%20DoS_Spoofing%20Attack%20against%20VPN%20tunnels.pdf"},{"name":"ADV-2008-0953","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/0953/references"},{"name":"vpn1-ipaddress-dos(41260)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41260"},{"name":"https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579","refsource":"CONFIRM","url":"https://supportcenter.checkpoint.com/supportcenter/portal?solutionid=sk34579"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-1397","datePublished":"2008-03-20T00:00:00.000Z","dateReserved":"2008-03-19T00:00:00.000Z","dateUpdated":"2024-08-07T08:17:34.714Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-03-20 00:44:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-264","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:S/C:P/I:P/A:P","baseScore":6.5,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"SINGLE","confidentialityImpact":"PARTIAL","integrityImpact":"PARTIAL","availabilityImpact":"PARTIAL"},"baseSeverity":"MEDIUM","exploitabilityScore":8,"impactScore":6.4,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:check_point_vpn-1_pro:ngx_r61:*:*:*:*:*:*:*","matchCriteriaId":"9AE9A8C6-3273-4A44-B407-F28094569860"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:check_point_vpn-1_pro:ngx_r62_ga:*:*:*:*:*:*:*","matchCriteriaId":"C01B3DF8-A2BD-486F-A0EB-800F8F906FAA"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:vpn-1:ngx_r60:*:pro:*:*:*:*:*","matchCriteriaId":"95028F5A-F2DB-4440-B6BB-3F4A0C8C1FC7"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:vpn-1_firewall-1:ng_ai_r55:*:*:*:*:*:*:*","matchCriteriaId":"0F4EAB35-FB40-45C7-BD09-7524D50C3FB8"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:vpn-1_power_utm:ngx_r65_with_messaging_security:*:*:*:*:*:*:*","matchCriteriaId":"E28266A6-257E-499C-AF99-8CDF204DBF46"},{"vulnerable":true,"criteria":"cpe:2.3:a:checkpoint:vpn-1_power_utm_with_ngx:r65:*:*:*:*:*:*:*","matchCriteriaId":"799986F4-BDB5-46AB-9CFF-102CB9CD3BE8"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"1397","Ordinal":"1","Title":"CVE-2008-1397","CVE":"CVE-2008-1397","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"1397","Ordinal":"1","NoteData":"Check Point VPN-1 Power/UTM, with NGX R60 through R65 and NG AI R55 software, allows remote authenticated users to cause a denial of service (site-to-site VPN tunnel outage), and possibly intercept network traffic, by configuring the local RFC1918 IP address to be the same as one of this tunnel's endpoint RFC1918 IP addresses, and then using SecuRemote to connect to a network interface at the other endpoint.","Type":"Description","Title":"CVE-2008-1397"},{"CveYear":"2008","CveId":"1397","Ordinal":"2","NoteData":"2008-03-19","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"1397","Ordinal":"3","NoteData":"2017-08-07","Type":"Other","Title":"Modified"}]}}}