Support Center > Search Results > SecureKnowledge Details
Check Point response to CVE-2015-6563 Technical Level
  • A security bypass vulnerability exists in sshd due to improper handling of username data in MONITOR_REQ_PAM_INIT_CTX requests. A local attacker can exploit this by sending a MONITOR_REQ_PWNAM request to conduct an impersonation attack. For more information, see:

This vulnerability requires Expert access to the system. If a remote attacker has expert access, he/she won't need to use this vulnerability. Therefore, it is less relevant to IPSO/GAiA, SecurePlatform.

This solution has been verified for the specific scenario, described by the combination of Product, Version and Symptoms. It may not work in other scenarios.

Give us Feedback
Please rate this document