Show plain JSON{"cve": {"data_type": "CVE", "references": {"reference_data": [{"url": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk180271", "name": "https://supportcenter.checkpoint.com/supportcenter/portal?eventSubmit_doGoviewsolutiondetails=&solutionid=sk180271", "tags": ["Mitigation", "Patch", "Vendor Advisory"], "refsource": "MISC"}]}, "data_format": "MITRE", "description": {"description_data": [{"lang": "en", "value": "The IPsec VPN blade has a dedicated portal for downloading and connecting through SSL Network Extender (SNX). If the portal is configured for username/password authentication, it is vulnerable to a brute-force attack on usernames and passwords."}]}, "problemtype": {"problemtype_data": [{"description": [{"lang": "en", "value": "CWE-307"}]}]}, "data_version": "4.0", "CVE_data_meta": {"ID": "CVE-2022-23746", "ASSIGNER": "cve@checkpoint.com"}}, "impact": {"baseMetricV3": {"cvssV3": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}}, "publishedDate": "2022-11-30T19:15Z", "configurations": {"nodes": [{"children": [], "operator": "OR", "cpe_match": [{"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_9:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_14:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_22:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_30:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_38:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_44:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_45:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_55:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_61:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_66:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_75:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:take_78:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:-:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:-:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:-:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:-:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:-:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:-:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81.10:-:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_10:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_11:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_13:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_17:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_23:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_25:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_27:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_29:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_34:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_36:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_42:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_44:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_51:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_56:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_58:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_60:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_65:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_68:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_69:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_72:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r81:take_74:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_25:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_38:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_45:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_48:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_53:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_54:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_55:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_65:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_67:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_69:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_74:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_77:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_78:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_83:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_87:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_89:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_91:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_92:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_93:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_94:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_100:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_102:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_114:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_118:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_119:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_120:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_121:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_125:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_126:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_131:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_138:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_139:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_150:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_153:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_154:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_156:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_158:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_161:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_172:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.40:take_173:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_31:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_32:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_45:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_49:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_56:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_73:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_75:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_82:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_97:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30sp:take_101:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_19:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_50:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_76:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_107:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_111:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_135:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_136:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_140:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_155:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_163:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_166:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_168:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_180:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_191:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_195:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_196:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_210:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_213:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_214:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_215:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_217:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_219:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_221:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_226:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_227:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_228:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_232:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_235:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_236:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_237:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_241:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_242:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_245:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_246:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_251:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.30:take_254:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_105:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_121:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_163:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_178:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_191:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_210:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_240:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_258:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_266:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_273:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_279:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_283:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_295:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_302:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_304:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_305:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_306:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_309:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_310:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_313:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_314:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_315:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_317:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_326:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_327:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_332:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_334:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_335:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20sp:take_331:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_10:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_17:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_33:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_42:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_47:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_73:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_74:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_80:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_87:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_91:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_103:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_117:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_118:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_127:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_134:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_135:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_138:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_141:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_149:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_155:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_156:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_160:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_161:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_173:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_183:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_187:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_188:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_190:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_202:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_203:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_205:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_208:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_210:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_211:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}, {"cpe23Uri": "cpe:2.3:a:checkpoint:ssl_network_extender:r80.20:take_220:*:*:*:-:*:*", "cpe_name": [], "vulnerable": true}]}], "CVE_data_version": "4.0"}, "lastModifiedDate": "2022-12-06T15:49Z"}