The information you are about to copy is INTERNAL!
DO NOT share it with anyone outside Check Point.
Check Point response to the POODLE Bites vulnerability (CVE-2014-3566)
Technical Level
Solution ID
sk102989
Technical Level
Product
All
Version
All
Platform / Model
All
Date Created
14-Oct-2014
Last Modified
09-Jul-2020
Symptoms
This attack (CVE-2014-3566), called POODLE, is similar to the BEAST attack and also allows a network attacker to extract the plaintext of targeted parts of an SSL connection, usually cookie data.
Attacker tricks the web browser into downgrading and connecting with SSLv3 protocol. This relies on a behavior of web browsers called insecure fallback, where web browsers attempt to negotiate lower versions of TLS or SSL when connections fail.
Check Point products are not vulnerable to the "POODLE Bites" vulnerability (CVE-2014-3566) with the following exceptions:
Inbound HTTPS Inspection - when HTTPS Inspection is set to protect an internal server, web browsers under certain conditions may use SSLv3 to connect to the Security Gateway.
Notes:
Enabling the IPS protection "Secure Socket Layer (SSL) v3.0" as described below will prevent a web browsers from using SSLv3 when connecting to a Security Gateway with Inbound HTTPS Inspection enabled.
Follow the configuration steps for HTTPS Inspection as listed below.
Mobile Access Blade - When using the Mobile Access Portal to access an application server (usually, internal server) over an HTTPS connection, SSLv3 might be used between the Mobile Access Gateway and the application server.
Connections between the Mobile Access Gateway and the application server will usually be within the corporate LAN, which makes these connections less likely to be exposed to this vulnerability.
Follow the configuration steps as listed below.
Other Check Point products require configuration steps as listed below to prevent web browsers from connecting to a Check Point machine using SSLv3:
This is a browser side vulnerability. Check Point recommends that customers update their web browsers to use the latest version and follow the browsers' vendors recommendations for disabling SSLv3 support in browsers.
Opera on Windows OS: http://help.opera.com/Windows/12.10/en/protocols.html In the 'Tools' menu - 'Preferences' - 'Advanced' tab - 'Security' - 'Security Protocols...', clear 'Enable SSL 3' and check 'Enable TLS 1', 'Enable TLS 1.1', and 'Enable TLS 1.2'.
To disable SSLv3 in versions R70 and lower, upgrade to a supported version (R75 and higher) and follow the instructions in this solution.
(II) IPS protection
On 15 Oct 2014, Check Point released "Secure Socket Layer (SSL) v3.0" IPS protection that protects customer environments. SSL v3.0 [RFC 6101] is considered an obsolete and insecure protocol. This protection blocks SSL v3.0 protocol and may be used to prevent attacks that exploit the "POODLE Bites" vulnerability (CVE-2014-3566) through Check Point Security Gateway.
The IPS protection "Secure Socket Layer (SSL) v3.0" is inactive by default and must be enabled manually.
Enable this IPS protection in Prevent mode (right-click on this protection, click on 'Prevent on All Profiles', and install policy).
Note: Customers who wish to verify whether SSL v3.0 is being used in their environment, can first activate this protection in Detect mode (followed by installing the policy), and review the SmartView Tracker logs before switching the IPS protection mode to Prevent.
In addition, to block SSLv2 connections, enable the IPS protection "Secure Sockets Layer Version 2.0" in Prevent mode (right-click on this protection, click on 'Prevent on All Profiles', and install policy).
In addition, to block SSLv2 connections on TCP port 25, enable the IPS protection "Non Compliant SSL" in Prevent mode in the following way:
In SmartDashboard, go to IPS tab
In the left upper pane, click on Protections
Search for Non Compliant SSL
Double-click on this protection
Double-click on the IPS profile
Select Override IPS Policy with - select Prevent
Check the box Protect SMTPS over SMTP Port (TCP/25)
Click on OK
Repeat Steps V - VIII for each IPS Profile
Click on OK
Install policy
(III) Configuration recommendations for Check Point Portals and OS
To prevent web browsers using SSLv3 from connecting to a machine running Check Point products, the following steps are recommended:
Note: By enforcing TLS as the standard, some older web browsers may not be able to connect to web sites.
Multi Portal is used to run software blades' portals on TCP port 443. Software blades that can be configured with such portal are: Mobile Access Blade, VPN (Remote Access), Identity Awareness, DLP or when UserCheck is configured to use port 443.
In SmartDashboard, go to 'Policy' menu - click on 'Global Properties...'.
Go to 'SmartDashboard Customization' pane - in the 'Advanced Configuration' section, click on 'Configure...' button.
Go to 'Portal Properties' page.
In the 'snx_ssl_min_ver' field (Lowest SSL/TLS version for portals), change from SSLv3 (default) to TLS1.0.
Click 'OK' to apply the changes.
Install policy on all managed Security Gateways.
Note: For R80.x, use GuiDBedit:
Instructions for versions R75.47 and lower
Note: Most of the software blades' portals that use Multi Portal are intended for internal users via internal networks, in which the scenario described in this attack is not likely. The portals that are usually open to external networks and accessible via web browsers, are Mobile Access blade portal and SNX VPN blade portal.
Check Point released a hotfix that configures both Multi Portal and HTTPS Inspection (both Outbound and Inbound) not to use SSLv3.
Refer to the "Summary table with recommended hotfixes" below for the download links and installation instructions.
In case you decide to re-enable the use of SSLv3 by Multi Portal and HTTPS Inspection blade after installing the hotfix, follow these steps:
On Gaia / SecurePlatform / Linux OS: Edit the $CPDIR/tmp/.CPprofile.sh script in Vi editor:
Add this line: CPTLS_SUPPORT_SSLv3=1 ; export CPTLS_SUPPORT_SSLv3
Under this line INFODIR=/opt/CPinfo-10 ; export INFODIR
On Gaia / SecurePlatform / Linux OS: Edit the $CPDIR/tmp/.CPprofile.csh script in Vi editor:
Add this line: setenv CPTLS_SUPPORT_SSLv3 1
Under this line: setenv INFODIR "/opt/CPinfo-10"
On Windows OS: Go to Start menu - 'Run...' - paste "%WINDIR%\system32\rundll32.exe" sysdm.cpl,EditEnvironmentVariables - click on OK.
Alternatively:
Desktop - right-click on the 'My Computer' icon - click on 'Properties'
Go to 'Advanced' tab.
At the bottom, click on 'Environment Variables...' button.
Under 'System Variables' - click on 'New...'
name: CPTLS_SUPPORT_SSLv3
value: 1
and click 'OK' to close the 'New System Variable' window.
Click on 'OK' to close these windows.
Reboot the machine.
Important Note: To disable the use of SSLv3 after the above changes (adding the 'CPTLS_SUPPORT_SSLv3' variable):
On Gaia / SecurePlatform / Linux OS: Simply delete the lines with 'CPTLS_SUPPORT_SSLv3' variable from both "CPprofile.*" shell scripts and reboot the machine.
On Windows OS: Under 'System Variables', click on the 'CPTLS_SUPPORT_SSLv3' variable - click on 'Delete' and reboot the machine.
If 'HTTPS Inspection' blade is enabled on a Security Gateway, then configure it not to use SSLv3.
Important Note: Some servers on the Internet still use SSLv3. Once this step is performed, there will be no connectivity to these servers through the Security Gateway.
Connect with SmartDashboard to Security Management Server / Domain Management Server.
Go to 'File' menu - click on 'Database Revision Control...' - create a revision snapshot.
Close all SmartConsole windows (SmartDashboard, SmartView Tracker, SmartView Monitor, etc.).
Connect with GuiDBedit Tool to Security Management Server / Domain Management Server.
In the upper left pane, go to 'Table' - 'Other' - 'ssl_inspection'.
In the upper right pane, select the general_confs_obj.
Press CTRL+F (or go to 'Search' menu - 'Find') - paste ssl_min_ver - click on 'Find Next'.
In the lower pane, right-click on the 'ssl_min_ver' - 'Edit...' - choose "TLS1.0" - click on 'OK'.
Save the changes: go to 'File' menu - click on 'Save All'.
Close the GuiDBedit Tool.
Connect with SmartDashboard to Security Management Server / Domain Management Server.
Install the policy onto the relevant Security Gateways.
Additional instructions for Inbound HTTPS Inspection:
If Inbound HTTPS Inspection is enabled for internal servers, then enable the IPS Protection "Secure Socket Layer (SSL) v3.0" as described in the "IPS protection" section.
If IPS blade can not be enabled on the Security Gateway, then an additional hotfix is required to prevent web browsers from connecting with SSLv3 to internal servers through the Security Gateway with Inbound HTTPS Inspection enabled.
Refer to the "Summary table with recommended hotfixes" below for the download links and installation instructions.
Instructions for versions R75.47 and lower
Check Point released a hotfix that configures both Multi Portal and HTTPS Inspection (both Outbound and Inbound) not to use SSLv3.
Refer to the "Summary table with recommended hotfixes" below for the download links and installation instructions.
On each machine that runs Gaia OS (versions from R75.40 to R77.20), configure Gaia Portal not to use SSLv3. Note: In R77.30, SSLv3 support for Gaia Portal is disabled by default (no action is needed).
Important Note: Before implementing the steps below, save the current Gaia database - log in to Clish and run save config command.
If SecurePlatfrom WebUI uses Multi Portal (runs on TCP port 443 together with other software blades' portals), then there is no need to take any further steps.
In addition, Check Point released a hotfix that completely prevents SecurePlatform WebUI from using SSLv3.
Refer to the "Summary table with recommended hotfixes" below for the download links and installation instructions. Note: This hotfix is integrated (SSLv3 support for SecurePlatform WebUI is disabled by default - no action is needed) in:
R77.30
Take 36 of Jumbo Hotfix Accumulator for R77.20 (R77_20_jumbo_hf)
Take 72 of Jumbo Hotfix Accumulator for R77.10 (gypsy_hf_base_021)
Take 24 of Jumbo Hotfix Accumulator for R77 (gulli_hf_base_008)
Take 50 of Jumbo Hotfix Accumulator for R76 (gizmo_hf_041_050)
Take 59 of Jumbo Hotfix Accumulator for R75.47 (fiat_hf_base_026)
Edit the current configuration template in Vi editor:
[admin]# vi /web/conf/httpd.conf.templ
Search for "SSL Support" section.
Add the following line in this section:
SSLProtocol +TLSv1
The section should look like this:
##
## SSL Support
##
## When we also provide SSL we have to listen to the
## standard HTTP port (see above) and to the HTTPS port
##
SSLProtocol +TLSv1
Save the changes and exit from Vi editor.
Change the file system back to "read-only" mode:
[admin]# mount -u -r /
Update the current configuration of HTTPD daemon based on the modified configuration template:
The above procedure for Disk-based Systems can also be used on Diskless (Flash-based) Systems. However, the configuration change will not be preserved in the event of a reboot.
Check Point released new IPSO images (IPSO 6.2 and IPSO 4.2) for Diskless (Flash-based) Systems, which incorporate the necessary change in the configuration file.
Download the relevant IPSO image with improved Bash shell to your Windows computer. Unpack the ZIP file. Copy the IPSO image to an FTP server or to the appliance to be upgraded.
Login as admin, and make sure that you are in /var/emhome/admin directory (run 'pwd' command).
Run newimage -ik Note: If you add a new version of IPSO by using the newimage command and the "-k" (keep) option, your previous packages are active with the new IPSO version.
Specify where the IPSO image is located (ipso-6.2.tgz for IPSO 6.2; ipso-4.2.tgz for IPSO 4.2), selecting one of the following options: Install from FTP server with user and password (You will be prompted for FTP server location and credentials) or Install from local filesystem (You will be prompted for pathname to the packages, or enter "." for the current directory).
Enter the name of the IPSO package (ipso-6.2.tgz for IPSO 6.2; ipso.tgz for IPSO 4.2), and press 'Enter'.
After the upgrade process completes, choose the image to run: Choose 'Newly Installed' image.
Reboot the machine by typing reboot at the prompt.
Verify the current image. Type uname -a. The output will contain the following strings: IPSO 6.2 MR4a: 6.2-GAMR4A204 IPSO 6.2 MR3a2: 6.2-GAMR3A304 IPSO 6.2 MR2a: 6.2-GAMR2A03 IPSO 4.2 MR9: BLD111MR9A02
Client Authentication Portal is configured by default to work only in clear HTTP, and in such configuration it is not vulnerable to the "POODLE Bites" vulnerability.
In case Client Authentication Portal is configured to use SSL (works over HTTPS), which requires the IPSec VPN blade and installing Security Gateway's certificates on end-clients to be trusted, the following steps should be performed in order to block SSLv3:
Note: There are three different procedures: (A) for Gaia / SecurePlatform OS R75.47, R77 and higher; (B) for Gaia / SecurePlatform OS R76, R75.46 and lower; (C) for IPSO OS.
Instructions for version R77.30 - Gaia / SecurePlatform OS
Instructions for versions R80.10 and higher - Gaia OS
Connect to command line on Security Gateway / each cluster member.
Stop Check Point services:
[Expert@HostName]# cpstop
Permanently disable the SSLv2 and SSLv3 using the relevant environment variables:
Note: These commands will make the necessary changes in the Check Point start-up scripts ($CPDIR/tmp/.CPprofile.sh and $CPDIR/tmp/.CPprofile.csh), so that these environment variables are set during every boot.
[Expert@HostName]# cd /opt/CPsuite-<R7X>/CPinstall/
Verify that the relevant environment variables were set:
[Expert@HostName]# env | grep ASSL_NO_SSL
Output should show: ASSL_NO_SSLV2=1 ASSL_NO_SSLV3=1
Instructions for versions R76, R75.46 and lower - Gaia / SecurePlatform OS
Contact Check Point Support to get a Hotfix for this issue. A Support Engineer will make sure the Hotfix is compatible with your environment before providing the Hotfix. For faster resolution and verification, please collect CPinfo files from the Security Management Server and Security Gateways / Cluster Members involved in the case.
Install the hotfix on Security Gateway / each cluster member:
[Expert@HostName]# tar -zxvf fw1_wrapper_<HOTFIX_NAME>.tgz [Expert@HostName]# ./fw1_wrapper_<HOTFIX_NAME> Note: Do NOT reboot yet.
Permanently disable the SSLv2 and SSLv3 using the 'XInstall AddToCPprofile' command as described in the section "Instructions for versions R75.47, R77 and higher".
Reboot the machine.
Instructions for IPSO OS
Connect to command line on Security Gateway / each cluster member.
Create a plain-text file (in any directory) with the following IPSO OS configuration:
dynamic:pkgadd:CPsuite-R77-00:env:ASSL_NO_SSLV2 t
dynamic:pkgadd:CPsuite-R77-00:env:ASSL_NO_SSLV2:opern overwrite
dynamic:pkgadd:CPsuite-R77-00:env:ASSL_NO_SSLV2:value 1
dynamic:pkgadd:CPsuite-R77-00:env:ASSL_NO_SSLV3 t
dynamic:pkgadd:CPsuite-R77-00:env:ASSL_NO_SSLV3:opern overwrite
dynamic:pkgadd:CPsuite-R77-00:env:ASSL_NO_SSLV3:value 1
On R76 version:
dynamic:pkgadd:CPsuite-R76-00:env:ASSL_NO_SSLV2 t
dynamic:pkgadd:CPsuite-R76-00:env:ASSL_NO_SSLV2:opern overwrite
dynamic:pkgadd:CPsuite-R76-00:env:ASSL_NO_SSLV2:value 1
dynamic:pkgadd:CPsuite-R76-00:env:ASSL_NO_SSLV3 t
dynamic:pkgadd:CPsuite-R76-00:env:ASSL_NO_SSLV3:opern overwrite
dynamic:pkgadd:CPsuite-R76-00:env:ASSL_NO_SSLV3:value 1
On R75.4X versions:
dynamic:pkgadd:CPsuite-R75.40-00:env:ASSL_NO_SSLV2 t
dynamic:pkgadd:CPsuite-R75.40-00:env:ASSL_NO_SSLV2:opern overwrite
dynamic:pkgadd:CPsuite-R75.40-00:env:ASSL_NO_SSLV2:value 1
dynamic:pkgadd:CPsuite-R75.40-00:env:ASSL_NO_SSLV3 t
dynamic:pkgadd:CPsuite-R75.40-00:env:ASSL_NO_SSLV3:opern overwrite
dynamic:pkgadd:CPsuite-R75.40-00:env:ASSL_NO_SSLV3:value 1
On R75.20/R75.30 versions:
dynamic:pkgadd:CPsuite-R75.20-00:env:ASSL_NO_SSLV2 t
dynamic:pkgadd:CPsuite-R75.20-00:env:ASSL_NO_SSLV2:opern overwrite
dynamic:pkgadd:CPsuite-R75.20-00:env:ASSL_NO_SSLV2:value 1
dynamic:pkgadd:CPsuite-R75.20-00:env:ASSL_NO_SSLV3 t
dynamic:pkgadd:CPsuite-R75.20-00:env:ASSL_NO_SSLV3:opern overwrite
dynamic:pkgadd:CPsuite-R75.20-00:env:ASSL_NO_SSLV3:value 1
On R75/R75.10 versions:
dynamic:pkgadd:CPsuite-R75-00:env:ASSL_NO_SSLV2 t
dynamic:pkgadd:CPsuite-R75-00:env:ASSL_NO_SSLV2:opern overwrite
dynamic:pkgadd:CPsuite-R75-00:env:ASSL_NO_SSLV2:value 1
dynamic:pkgadd:CPsuite-R75-00:env:ASSL_NO_SSLV3 t
dynamic:pkgadd:CPsuite-R75-00:env:ASSL_NO_SSLV3:opern overwrite
dynamic:pkgadd:CPsuite-R75-00:env:ASSL_NO_SSLV3:value 1
Save the changes in the file and exit from Vi editor.
Note: If you created this file on a Windows OS and then transferred it to IP Series Appliance, then convert it from DOS format to UNIX format: HostName[admin]# dos2unix /some_path_to/disable_ssl.txt
Load the IPSO OS configuration from the plain-text file:
Verify that the relevant environment variables were set:
Get the Process ID (PID) of FWD daemon:
HostName[admin]# ps ax | grep fwd
Example output:
291 ?? I 0:00.01 /bin/csh -fb /opt/CPsuite-R77/fw1/bin/fwd
Use the PID ("291" in our example) to check whether the environment variables loaded for FWD daemon contain the configured variables that disable the SSLv2 and SSLv3 - "ASSL_NO_SSLV2=1" and "ASSL_NO_SSLV3=1":
Check Point released a hotfix that prevents Internal CA portal from using SSLv3.
Refer to the "Summary table with recommended hotfixes" section below for the download links and installation instructions. Note: This hotfix is integrated in:
R77.30
Take 115 of Jumbo Hotfix for R77.20 (R77_20_jumbo_hf)
Take 131 of Jumbo Hotfix Accumulator for R77.10 (gypsy_hf_base_021)
Take 38 of Jumbo Hotfix Accumulator for R77 (gulli_hf_base_008)
Take 61 of Jumbo Hotfix Accumulator for R76 (gizmo_hf_041_050)
Take 86 of Jumbo Hotfix Accumulator for R75.47 (fiat_hf_base_026)
To disable SSLv2 and SSLv3 (and use only TLSv1), add the following Postfix configuration options to the $FWDIR/conf/mta_postfix_options.cf file (notice the spaces):
In SmartDashboard, install the Threat Prevention policy.
Notes:
This change has wide impact - it will also block reception of clear text e-mails over SMTP.
You have to use the Postfix legacy syntax above because Check Point is running Postfix lower than v2.5.
If you change either of the Postfix configuration options above to exclude SSLv3 (i.e., to use only TLSv1), then your servers may fail to receive data from certain delivery agents that support only SSLv3.
Mail Transfer Agent (MTA) is supported only by Threat Emulation blade, Threat Extraction blade, Data Loss Prevention blade, and Anti-Spam & Email Security blade.
Note: For appliances running R75.20.50 firmware version and managed by Check Point Cloud service, download R75.20.51.
Perform an upgrade using the Appliance's WebUI.
Notes:
This firmware includes previous released hotfix R75.20 HFA66.
To uninstall the improved firmware: go to 'Device' tab - go to 'System' section - click on 'System Operations' - click on the 'Revert to Previous image' button. For detailed instructions, refer to Check Point 600 Appliance Admin Guide (page 43), and to Check Point 1100 Appliance Admin Guide (page 69).
All XOS versions ship with an embedded Web server that is potentially vulnerable to the "POODLE Bites" vulnerability (CVE-2014-3566).
This issue will be addressed in XOS v11.0.0, 10.0.3, 9.7.6, 9.6.10.
About the XOS Web Server
The embedded Web server is disabled by default. It only runs if it has been enabled via the CLI command configure web-server. If enabled, the embedded Web server will communicate via SSLv3 when requested by a client. To determine if the Web server is enabled on your chassis, use the CLI command show web-server.
The embedded Web server is only used to host the Greenlight Element Manager (GEM) health monitoring application. GEM displays primarily read-only health and statistical information for the chassis, and provides the ability to retrieve chassis log files. The GEM application does not allow a user to reconfigure the chassis or modify the chassis state.
The embedded Web server can only be accessed via the CPM management ports and can never be accessed via data ports on the NPM modules. In a secure installation, it is expected that the CPM management ports are connected to a trusted management network and do not have direct access to the Internet. Access to the Web server can be further restricted to trusted client devices or subnets by configuring access control lists on the CPM module.
If you do not use GEM, you can disable the Web server by issuing the CLI command configure no web-server. If you do use GEM, you can specifically disable SSLv3 by following the steps in the workaround below.
Workaround:
For X-Series XOS, disable SSLv3 by specifying the allowed TLS protocols in the HTTP Connector definition in the Tomcat server.xml configuration file:
Adding ability for Mobile Access Blade to connect over HTTPS to a web server that uses an SHA-256 signed certificate (refer to sk101541).
Gaia, SecurePlatform, Linux, XOS
Manual
IPSO
Manual
Windows
Manual
R77.10
Gaia
CPUSE
Mobile Access Blade - prevents from using SSLv3 when connecting to application servers.
Adding ability for Mobile Access Blade to connect over HTTPS to a web server that uses an SHA-256 signed certificate (refer to sk101541).
Inbound HTTPS Inspection - Enforces web browsers to connect with SSL/TLS version according to SmartDashboard configuration.
Needed if IPS protection is not applicable.
HTTPS Inspection needs to be configured according to Recommendations for HTTPS Inspection
SecurePlatform WebUI - prevents from using SSLv3.
Management Portal (SmartPortal) - prevents from using SSLv3.
Note: Effective May 05, 2015, all hotfix packages have been replaced with updated packages. Refer to this list of improvements.
Gaia, SecurePlatform, Linux, XOS
Manual
IPSO
Manual
Windows
Manual
R77
Gaia
CPUSE
Mobile Access Blade - prevents from using SSLv3 when connecting to application servers.
Adding ability for Mobile Access Blade to connect over HTTPS to a web server that uses an SHA-256 signed certificate (refer to sk101541).
Inbound HTTPS Inspection - Enforces web browsers to connect with SSL/TLS version according to SmartDashboard configuration.
Needed if IPS protection is not applicable.
HTTPS Inspection needs to be configured according to Recommendations for HTTPS Inspection
SecurePlatform WebUI - prevents from using SSLv3.
Management Portal (SmartPortal) - prevents from using SSLv3.
Note: Effective May 05, 2015, all hotfix packages have been replaced with updated packages. Refer to this list of improvements.
Gaia, SecurePlatform, Linux
Manual
IPSO
Manual
Windows
Manual
R76
Gaia
CPUSE
Mobile Access Blade - prevents from using SSLv3 when connecting to application servers.
Adding ability for Mobile Access Blade to connect over HTTPS to a web server that uses an SHA-256 signed certificate (refer to sk101541).
Inbound HTTPS Inspection - Enforces web browsers to connect with SSL/TLS version according to SmartDashboard configuration.
Needed if IPS protection is not applicable.
HTTPS Inspection needs to be configured according to Recommendations for HTTPS Inspection
SecurePlatform WebUI - prevents from using SSLv3.
Management Portal (SmartPortal) - prevents from using SSLv3.
Note: Effective May 05, 2015, all hotfix packages have been replaced with updated packages. Refer to this list of improvements.
Gaia, SecurePlatform, Linux
Manual
IPSO
Manual
Windows
Manual
R75.47
Gaia
CPUSE
Multi Portal - prevents from using SSLv3.
Mobile Access Blade - prevents from using SSLv3 when connecting to application servers.
HTTPS Inspection (both Outbound and Inbound) - configures not to use SSLv3.
Note: Effective Aug 11, 2015, packages for Gaia (CPUSE & Manual), SecurePlatform, and Linux have been replaced for installation improvement (no additional fixes were added).
Note: Effective May 05, 2015, all hotfix packages have been replaced with updated packages. Refer to this list of improvements.
Note: Effective Dec 28, 2014, the R75.47 Hotfix has been replaced with an updated package:
Connect to the Gaia Portal and navigate to the 'Upgrades (CPUSE)' pane / to the 'Software Updates' pane - click on 'Status and Actions'.
Select the hotfix package - <VERSION> Hotfix for sk102989 (Check Point response to the POODLE Bites vulnerability CVE-2014-3566) - and click on 'Install Update' button on the toolbar.
Hotfix has to be installed on all Check Point machines running on Gaia / SecurePlatform / Linux OS.
Notes:
Make sure to take a snapshot of your Check Point machine before installing this hotfix (on Gaia / SecurePlatform OS).
In cluster environment, this procedure must be performed on all members of the cluster.
In Management HA environment, this procedure must be performed on both Management Servers.
Download the relevant hotfix package from the summary table above.
Transfer the hotfix package to the machine (into some directory) and unpack it: [Expert@HostName]# tar -zxvf Check_Point_Hotfix_<VERSION>_Linux_sk102989.tgz
Install the hotfix: [Expert@HostName]# ./UnixInstallScript Note: The script will stop all of Check Point services ('cpstop') - read the output on the screen.
Hotfix has to be installed on all Check Point machines running on IPSO OS.
Notes:
Make sure to take a snapshot of your Check Point machine before installing this hotfix (on Gaia / SecurePlatform OS).
In cluster environment, this procedure must be performed on all members of the cluster.
In Management HA environment, this procedure must be performed on both Management Servers.
Download the relevant hotfix package from the summary table above.
Transfer the hotfix package to the machine (into some directory) and unpack it: [Expert@HostName]# tar -zxvf Check_Point_Hotfix_<VERSION>_IPSO_sk102989.tgz
Install the hotfix: [Expert@HostName]# ./fw1_wrapper_<HOTFIX_NAME> Note: The script will stop all of Check Point services ('cpstop') - read the output on the screen.
Hotfix has to be installed on all Check Point machines running on Windows OS.
Notes:
In cluster environment, this procedure must be performed on all members of the cluster.
In Management HA environment, this procedure must be performed on both Management Servers.
Download the relevant hotfix package from the summary table above.
Transfer the hotfix package (Check_Point_Hotfix_<VERSION>_Win_sk102989.tgz) to the machine (into some directory). To unpack the hotfix package, use any application that works with archives (WinRAR, WinZIP, 7-zip, TUGZip, IZArc, etc.).
Install the hotfix:
Open the Disk_Images folder.
Open the Disk1 folder.
Right-click on the setup.exe file - select 'Run as administrator'.
Note: The installation will stop all of Check Point services ('cpstop') - read the output on the screen.
Reboot the machine.
(IV) General best practice
As a general best practice:
Check Point recommends that customers allow access to their system administrator portals (Gaia Portal, SecurePlatform WebUI, and IPSO Network Voyager) only via secured networks.
Check Point recommends that customers disable SSLv3 on all Web servers accessible via Check Point Security Gateway.
Improved instructions in the "Recommendations for Gaia Portal" section.
16 Mar 2016
Clarified that vulnerable firmware on 600 / 1100 / Security Gateway 80 appliances is R75.20.X.
13 Mar 2016
"IPS protection" - added recommendation to enable the IPS protection "Non Compliant SSL" to block SSLv2 connections.
07 Mar 2016
"IPS protection" - added recommendation to enable the IPS protection "Secure Sockets Layer Version 2.0" to block SSLv2 connections.
"Recommendations for Mail Transfer Agent (MTA)" - added a note that disabling SSLv2 and SSLv3 (and using only TLSv1) will also block reception of clear text e-mails over SMTP.
17 Dec 2015
"Recommendations for Edge / Safe@Office devices" - added a note that SSLv3 is disabled in Web GUI starting in firmware 8.2.77.
15 Dec 2015
"Recommendations for IPSO Network Voyager" - added a note that the fix for disabling SSLv3 is already integrated into IPSO 6.2 MR5 (Build GA100) image.
14 Nov 2015
Added a list of versions and Jumbo Hotfix Accumulators, in which the relevant hotfix is already integrated in these sections:
"Recommendations for Mobile Access Blade"
"Recommendations for Gaia Portal"
"Recommendations for SecurePlatform WebUI"
"Recommendations for Management Portal (SmartPortal)"
"Recommendations for Internal CA (ICA) Portal"
08 Nov 2015
"Summary table with recommended hotfixes" - added a note that all hotfixes were integrated into R77.30.
15 Sep 2015
Updated recommendations for Client Authentication Portal on IPSO OS.
13 Aug 2015
Added recommendations for Client Authentication Portal on IPSO OS (running R77 and higher).
11 Aug 2015
Added a note that R75.47 hotfix packages for Gaia (CPUSE & Manual), SecurePlatform, and Linux were replaced with updated packages for installation improvement (no additional fixes were added).
03 Aug 2015
Updated hotfix installation instructions for Gaia / SecurePlatform / Linux / IPSO OS (manual installation in Command Line)
21 June 2015
Added recommendations for disabling SSLv3 in SNX Portal on Locally Managed 600 / 1100 / 1200R appliances.
27 May 2015
Added recommendations for Mail Transfer Agent (MTA).
05 May 2015
Added a note that all hotfix packages were replaced with updated packages.
01 Apr 2015
Added a note that R77.20 Hotfix also resolves sk101708.
28 Jan 2015
Added a note in the "Recommendations for Gaia Portal" section to run Clish command "save config".
07 Jan 2015
Updated recommendations for LOM card WebUI.
28 Dec 2014
Added a note that the R75.47 hotfix package was replaced with an updated package.
Added a note that the R77.20 hotfix package was replaced with an updated package.
Added a note that the current R77.10 hotfix package also adds the ability for Mobile Access Blade to connect over HTTPS to a web server that uses an SHA-256 signed certificate (refer to sk101541).